Kali Linux is a comprehensive platform for penetration test and security audit, has a wide range of usages in the information security industry. It comes with many advanced tools that can be used to identify the target and detect, exploit the vulnerabilities that have not been discovered in the target network.

Kali Linux - Assuring Security by Penetration Testing uses 12 chapters to explain how to use the cutting-edge hacking tools and technologies step by step, which is helpful to improve the readers' practical skills of penetration test. This book discussed various preparation and operation process that the penetration testing needs, designed to reflect the attack scenarios in the real world from business perspectives through real cases.

The explanation steps in this book are clear and easy to understand, with the addition of rich samples, for whether experienced veterans in penetration testing, or beginners, they all can find their desired knowledge in Kali Linux – Assuring Security by Penetration.

Table Of Contents

  • PART I - Lab Preparation and Testing Procedures
    • Chapter 1. Beginning with Kali Linux
    • Chapter 2. Penetration Testing Methodology
  • PART II - Penetration Testers Armory
    • Chapter 3. Target Scoping
    • Chapter 4. Information Gathering
    • Chapter 5. Target Discovery
    • Chapter 6. Enumerating Target
    • Chapter 7. Vulnerability Mapping
    • Chapter 8. Social Engineering
    • Chapter 9. Target Exploitation
    • Chapter 10. Privilege Escalation
    • Chapter 11. Maintaining Access
    • Chapter 12. Documentation and Reporting
  • PART III - Extra Ammunition
    • Appendix A. Supplementary Tools
    • Appendix B. Key Resources

Download URLs

Format Download Size
PDF 7.80 MB
(Homepage)