Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Chapter 1. Introduction
Information in This Chapter Book Overview and Key Learning Points Book Audience Diagrams, Figures, and Screen Captures Welcome Penetration Testing Lifecycle Terms Kali History References
Chapter 2. Download and Install Kali Linux
Information in This Chapter Chapter Overview and Key Learning Points Kali Linux System Information Downloading Kali Hard Drive Installation Thumb Drive Installation SD Card Installation Summary
Chapter 3. Software, Patches, and Upgrades
Information in This Chapter Chapter Overview and Key Learning Points APT Package Handling Utility Debian Package Manager Tarballs A Practical Guide to Installing Nessus Conclusion
Chapter 4. Configuring Kali Linux
Information in This Chapter Chapter Overview and Key Learning Points About This Chapter The Basics of Networking Using the Graphical User Interface to Configure Network Interfaces Using the Command Line to Configure Network Interfaces Using the GUI to Configure Wireless Cards Web Server FTP Server SSH Server Configure and Access External Media Updating Kali Upgrading Kali Adding a Repository Source Summary
Chapter 5. Building a Penetration Testing Lab
Information in This Chapter Chapter Overview and Key Learning Points Before Reading This Chapter: Build a Lab Building a Lab on a Dime Metasploitable2 Extending Your Lab The Magical Code Injection Rainbow
Chapter 6. Introduction to the Penetration Test Lifecycle
Information in This Chapter Chapter Overview And Key Learning Points Introduction to the Lifecycle Phase 1: Reconnaissance Phase 2: Scanning Phase 3: Exploitation Phase 4: Maintaining Access Phase 5: Reporting Summary
Chapter 7. Reconnaissance
Information in This Chapter Chapter Overview and Key Learning Points Introduction Start with the Targets Own Website Website Mirroring Google Searches Google Hacking Social Media Job Sites DNS and DNS Attacks Query a Name Server Zone Transfer Reference
Chapter 8. Scanning
Information in This Chapter Chapter Overview and Key Learning Points Introduction to Scanning Understanding Network Traffic NMAP the King of Scanners Selecting Ports HPING3 Nessus Summary
Chapter 9. Exploitation
Information in This Chapter Chapter Overview and Key Learning Points Introduction An Overview of Metasploit Accessing Metasploit Web Server and Web Application Exploitation Conclusion
Chapter 10. Maintaining Access
Information in This Chapter Chapter Overview and Key Learning Points Introduction Terminology and Core Concepts Backdoors Keyloggers Summary Reference
Chapter 11. Reports and Templates
Information in This Chapter Chapter Overview and Key Learning Points Reporting Presentation Report and Evidence Storage Summary
Appendix A. Tribal Chicken
Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5 Materials List Install and Configure Ubuntu Install Kali Linux 1.0.5 Customize the Interface Running Updates Building an ISO using Tribal Chicken Burning an ISO to a DVD or Blu-Ray Disc Testing and Validation (Short Version)
Appendix B. Kali Penetration Testing Tools Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion