Mastering Kali Linux For Advanced Penetration Testing | Infosecwithme
Thanks to Robert W. Beggs
Click on Download Button | Infosecwithme |
Table of Content | Index
Part 1: The Attacker's Kill Chain
1. Starting with Kali Linux
2. Identifying the Target - Passive Reconnaissance
3. Active Reconnaissance & Vulnerability Scanning
4. Exploit
5. Post Exploit - Action on the Objective
6. Post Exploit - Persistence
Part 2: The Delivery Phase
7. Physical Attacks & Social Engineering
8. Exploiting Wireless Communications
9. Reconnaissance & Exploitation of Web-based Applications
10. Exploiting Remote Access Communications
11. Client-side Exploitation
Appendix
Downloading Kali Linux
Basic Installation of Kali Linux
Setting up a test environment
Follow us:
Telegram:
https://t.me/blackhattrick
https://t.me/blackhattrick2
Facebook Page : Blackhattrickblog
Mastering Kali Linux For Advanced Penetration Testing | Infosecwithme
Reviewed by BlackHat
on
1:30 AM
Rating:
No comments:
Thanks for Valuable Comment. I will review and get back.