Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills.
Saved in:
Author / Creator: | Pillay, Rishalin. |
---|---|
Imprint: | Birmingham : Packt Publishing, Limited, 2019. |
Description: | 1 online resource (412 pages) |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/14140195 |
Table of Contents:
- Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Section 1: The Basics; Chapter 1: Introduction to Penetration Testing; Technical requirements; What is penetration testing?; Stages of a penetration test; Pre-engagement; Scoping; Timelines; Dealing with third parties; Payment; Your ""get out of jail free card; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; Executive summary; Technical report; Getting started with your lab
- Creating virtual machines in VMware, Hyper-V, and VirtualBoxMicrosoft Hyper-V; VMware; VirtualBox; Target machines; Metasploitable; Summary; Questions; Chapter 2: Getting Started with Kali Linux; Technical requirements; An introduction to Kali Linux; Installing and configuring Kali Linux; Installation; Installing Kali Linux on macOS; Installing Kali Linux using the Windows Subsystem for Linux (WSL); Installing Kali Linux using VirtualBox; Configuring Kali Linux; Basic commands in Kali Linux; Scripting in Kali Linux; The essential tools of Kali Linux; Nmap; Aircrack-ng
- John the Ripper (JTR) and HydraSET; Burp Suite; Summary; Questions; Section 2: Exploitation; Chapter 3: Performing Information Gathering; Technical requirements; Passive information gathering; Using the internet; Google dorks; Shodan; Shodan scripting; Using Kali Linux; Maltego; Active information gathering; Nmap; Vulnerability scanning; OpenVAS; Nessus; Capturing traffic; Wireshark; tcpdump; Summary; Questions; Chapter 4: Mastering Social Engineering; Technical requirements; What is social engineering?; Pretexting; Phishing; Spear phishing; Tailgating; Social engineering tools
- The social engineering toolkit (SET)Gophish; Modlishka; Wifiphisher; Creating a social engineering campaign; Installing Modlishka; Executing the attack; Using SET to create a phishing campaign; Summary; Questions; Chapter 5: Diving into the Metasploit Framework; Technical requirements; Introducing Metasploit; Updating the Metasploit Framework; Linking the Metasploit Framework to a database; Enhancing your experience within Metasploit; Using Metasploit to exploit a remote target; Finding modules; Exploit-DB; Rapid7 exploit database; 0day.today; Adding modules
- Metasploit options, shells, and payloadsOptions; Shells; Payloads; Working with MSFvenom; Summary; Questions; Chapter 6: Understanding Password Attacks; Technical requirements; Introduction to password attacks; Working with wordlists; Password profiling; Password mutation; Offline password attacks; John the Ripper; Hashcat; Online password attacks; Hydra; Medusa; Ncrack; Dumping passwords from memory; Summary; Questions; Chapter 7: Working with Burp Suite; Technical requirements; Understanding Burp Suite; Preparing your environment; Installing Burp Suite Professional; Setting up OWASP BWA