Kali Linux Penetration Testing Bible. Gus Khawaja

Чтение книги онлайн.

Читать онлайн книгу Kali Linux Penetration Testing Bible - Gus Khawaja страница 2

Kali Linux Penetration Testing Bible - Gus Khawaja

Скачать книгу

System Exploitation Summary

      15  CHAPTER 12: Pivoting and Lateral Movement Dumping Windows Hashes Pivoting with Port Redirection Summary

      16  CHAPTER 13: Cryptography and Hash Cracking Basics of Cryptography Cracking Secrets with Hashcat Summary

      17  CHAPTER 14: Reporting Overview of Reports in Penetration Testing Scoring Severities Report Presentation Summary

      18  CHAPTER 15: Assembly Language and Reverse Engineering CPU Registers Assembly Instructions Data Types Memory Segments Addressing Modes Reverse Engineering Example Summary

      19  CHAPTER 16: Buffer/Stack Overflow Basics of Stack Overflow Stack Overflow Exploitation Summary

      20  CHAPTER 17: Programming with Python Basics of Python Running Python Scripts Debugging Python Scripts Practicing Python Python Basic Syntaxes Variables More Techniques in Python Summary

      21  CHAPTER 18: Pentest Automation with Python Penetration Test Robot Summary

      22  APPENDIX A: APPENDIX AKali Linux Desktop at a Glance Downloading and Running a VM of Kali Linux Kali Xfce Desktop Summary

      23  APPENDIX B: APPENDIX BBuilding a Lab Environment Using Docker Docker Technology Summary

      24  Index

      25  Copyright

      26  About the Author

      27  About the Technical Editor

      28  Acknowledgments

      29  End User License Agreement

      List of Tables

      1 Chapter 1Table 1.1 Tmux Keyboard Shortcuts

      2 Chapter 2Table 2.1 Numerical ConditionsTable 2.2 String ConditionsTable 2.3 File/Directory Conditions

      3 Chapter 3Table 3.1 OSI LayersTable 3.2 Subnets and CIDRTable 3.3 Common Port NumbersTable 3.4 Nmap Version Intensity

      4 Chapter 4Table 4.1 The Most Common Query Criteria Used on the Shodan SiteTable 4.2 Google Dorks Common Queries

      5 Chapter 14Table 14.1 CVSS Score Rating

      6 Chapter 15Table 15.1 Flag RegistersTable 15.2 Assembly InstructionsTable 15.3 Assembly Jump InstructionsTable 15.4 Assembly InstructionsTable 15.5 Data TypesTable 15.6 Addressing Modes

      7 Chapter 17Table 17.1 Arithmetic OperatorsTable 17.2 String FormattersTable 17.3 String FunctionsTable 17.4 Comparision OperatorsTable 17.5 Python Escape Characters

      List of Illustrations

      1 Chapter 1Figure 1.1 Tmux New WindowFigure 1.2 New Tmux Highlighted TabFigure

Скачать книгу