Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
Part I
Introduction to Kali Linux and Hacking
Chapter 1: Introduction to Hacking
What is Hacking?
Malware
Session Hijacking
SQL Injection
Phishing
DOS
Reasons for Hacking
Black Hats
Grey Hats
Red Hats
Green Hats
Blue Hats
Script Kiddies
Hacktivists
White Hat (Ethical Hacking)
What is Cybersecurity?
The Elements of Cybersecurity
Information Security: The CIA Triad
Confidentiality
Integrity
Availability
Chapter 2: Introduction to Networking
What is a Network?
Types of Networks
LAN
WAN
VPN
Network Address
Nodes
Hosts
IP Address
Public vs. Private IP address
Chapter 3: Kali Linux: The Hacker Operating System
What is Linux?
What is Kali Linux?
Should I use Kali Linux?
Kali Linux Features
Hundreds of Penetration Testing Tools
Free
Secure
Customizable
Multi-Language Support
Open Source Git Tree
FHS Compliant
Wireless Device Support
Custom Kernel
How to Install Kali Linux
What You Need for Installation
Creating the Bootable USB with Linux
Chapter 4: Basic Linux Commands
The Terminal
Command Prompts
Executing the Commands
Archives
Directory Navigation
Disk Usage
File and Directory Commands
File Transfers
Hardware Information Commands
Installing Packages
Networking
Performance Monitoring
Process Management
Search
SSH Logins
System Information Commands
User Information and Management Commands
Part II
Kali Linux Hacking
Chapter 5: Nmap and Detecting and Exploiting Vulnerabilities
What is Nmap?
How to Use Nmap to Understand and Exploit Vulnerabilities
Scanning Commands
Scanning Techniques and Commands
TCP SYN Scan
TCP Connect() Scan
UDP Scan
FIN Scan
Ping Scan
Version Detection
Idle Scanning
Penetration Testing
Pre-Engagement
Reconnaissance
Chapter 6: How to Become and Remain Anonymous
Proxychains
VPN
Tor and Kali Linux
Chapter 7: Metasploit Framework
What is Metasploit?
Metasploit Users
Metasploit Modules
Using Metasploit
Installing Metasploit
Managing the Metasploit Database
The Metasploit Datastore
The Metasploit Workspaces
Chapter 8: Digital Certificate
What is a Digital Certificate?
Certificate Authorities
Types of Certificates
Root Certificate
Intermediate Certificate
SSL Certificate
Generating Self-Signed SSL Certificates
Chapter 9: Bash and Python Scripting
Conclusion
Assigning an IP address
Protocol Layers
Internet Protocol (IP)
The TCP/IP Model
Threats to Network Security
Man-in-the-Middle
Cyberattacks
DOS and DDOS
MAC Spoofing
Threat Modeling and Identifying Vulnerabilities
Exploitation
Post-Exploitation
Reporting
Retesting
← Prev
Back
Next →
← Prev
Back
Next →