This document outlines chapters in a book about using the Kali Linux platform to perform penetration testing and security assessments. It covers beginning with Kali Linux and setting it up, gathering information about targets, discovering targets on networks, enumerating details about targets, mapping vulnerabilities, using social engineering techniques, exploiting targets, escalating privileges on systems, maintaining persistent access, testing wireless networks, using Kali Linux on Android with Nethunter, and lists supplementary tools.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
152 views
Chapter 1: Beginning With Kali Linux
This document outlines chapters in a book about using the Kali Linux platform to perform penetration testing and security assessments. It covers beginning with Kali Linux and setting it up, gathering information about targets, discovering targets on networks, enumerating details about targets, mapping vulnerabilities, using social engineering techniques, exploiting targets, escalating privileges on systems, maintaining persistent access, testing wireless networks, using Kali Linux on Android with Nethunter, and lists supplementary tools.
Instant ebooks textbook (Ebook) Container Security: Fundamental Technology Concepts that Protect Containerized Applications by Liz Rice ISBN 9781492056706, 1492056707 download all chapters
(Ebook) The Art of Network Penetration Testing: How to Take Over Any Company in the World by Royce Davis ISBN 9781617296826, 1617296821 - The latest ebook is available, download it today