Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Introduction
What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author
CHAPTER 1: Mastering the Terminal Window
Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary
CHAPTER 2: Bash Scripting
Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary
CHAPTER 3: Network Hosts Scanning
Basics of Networking Network Scanning DNS Enumeration Summary
CHAPTER 4: Internet Information Gathering
Passive Footprinting and Reconnaissance Summary
CHAPTER 5: Social Engineering Attacks
Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary
CHAPTER 6: Advanced Enumeration Phase
Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary
CHAPTER 7: Exploitation Phase
Vulnerabilities Assessment Services Exploitation Summary
CHAPTER 8: Web Application Vulnerabilities
Web Application Vulnerabilities Summary
CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle
Web Enumeration and Exploitation Secure Software Development Lifecycle Summary
CHAPTER 10: Linux Privilege Escalation
Introduction to Kernel Exploits and Missing Configurations Kernel Exploits SUID Exploitation Overriding the Passwd Users File CRON Jobs Privilege Escalation sudoers Exploiting Running Services Automated Scripts Summary
CHAPTER 11: Windows Privilege Escalation
Windows System Enumeration File Transfers Windows System Exploitation Summary
CHAPTER 12: Pivoting and Lateral Movement
Dumping Windows Hashes Pivoting with Port Redirection Summary
CHAPTER 13: Cryptography and Hash Cracking
Basics of Cryptography Cracking Secrets with Hashcat Summary
CHAPTER 14: Reporting
Overview of Reports in Penetration Testing Scoring Severities Report Presentation Summary
CHAPTER 15: Assembly Language and Reverse Engineering
CPU Registers Assembly Instructions Data Types Memory Segments Addressing Modes Reverse Engineering Example Summary
CHAPTER 16: Buffer/Stack Overflow
Basics of Stack Overflow Stack Overflow Exploitation Summary
CHAPTER 17: Programming with Python
Basics of Python Running Python Scripts Debugging Python Scripts Practicing Python Python Basic Syntaxes Variables More Techniques in Python Summary
CHAPTER 18: Pentest Automation with Python
Penetration Test Robot Summary
APPENDIX A: APPENDIX AKali Linux Desktop at a Glance
Downloading and Running a VM of Kali Linux Kali Xfce Desktop Summary
APPENDIX B: APPENDIX BBuilding a Lab Environment Using Docker
Docker Technology Summary
Index Title Page Copyright About the Author About the Technical Editor Acknowledgments End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion