Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
Introduction
What Does This Book Cover?
Companion Download Files
How to Contact the Publisher
How to Contact the Author
CHAPTER 1: Mastering the Terminal Window
Kali Linux File System
Managing Users and Groups in Kali
Files and Folders Management in Kali Linux
Remote Connections in Kali
Kali Linux System Management
Networking in Kali Linux
Summary
CHAPTER 2: Bash Scripting
Basic Bash Scripting
Printing to the Screen in Bash
Variables
Script Parameters
User Input
Functions
Conditions and Loops
Summary
CHAPTER 3: Network Hosts Scanning
Basics of Networking
Network Scanning
DNS Enumeration
Summary
CHAPTER 4: Internet Information Gathering
Passive Footprinting and Reconnaissance
Summary
CHAPTER 5: Social Engineering Attacks
Spear Phishing Attacks
Payloads and Listeners
Social Engineering with the USB Rubber Ducky
Summary
CHAPTER 6: Advanced Enumeration Phase
Transfer Protocols
E‐mail Protocols
Database Protocols
CI/CD Protocols
Web Protocols 80/443
Graphical Remoting Protocols
File Sharing Protocols
Summary
CHAPTER 7: Exploitation Phase
Vulnerabilities Assessment
Services Exploitation
Summary
CHAPTER 8: Web Application Vulnerabilities
Web Application Vulnerabilities
Summary
CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle
Web Enumeration and Exploitation
Secure Software Development Lifecycle
Summary
CHAPTER 10: Linux Privilege Escalation
Introduction to Kernel Exploits and Missing Configurations
Kernel Exploits
SUID Exploitation
Overriding the Passwd Users File
CRON Jobs Privilege Escalation
sudoers
Exploiting Running Services
Automated Scripts
Summary
CHAPTER 11: Windows Privilege Escalation
Windows System Enumeration
File Transfers
Windows System Exploitation
Summary
CHAPTER 12: Pivoting and Lateral Movement
Dumping Windows Hashes
Pivoting with Port Redirection
Summary
CHAPTER 13: Cryptography and Hash Cracking
Basics of Cryptography
Cracking Secrets with Hashcat
Summary
CHAPTER 14: Reporting
Overview of Reports in Penetration Testing
Scoring Severities
Report Presentation
Summary
CHAPTER 15: Assembly Language and Reverse Engineering
CPU Registers
Assembly Instructions
Data Types
Memory Segments
Addressing Modes
Reverse Engineering Example
Summary
CHAPTER 16: Buffer/Stack Overflow
Basics of Stack Overflow
Stack Overflow Exploitation
Summary
CHAPTER 17: Programming with Python
Basics of Python
Running Python Scripts
Debugging Python Scripts
Practicing Python
Python Basic Syntaxes
Variables
More Techniques in Python
Summary
CHAPTER 18: Pentest Automation with Python
Penetration Test Robot
Summary
APPENDIX A: APPENDIX AKali Linux Desktop at a Glance
Downloading and Running a VM of Kali Linux
Kali Xfce Desktop
Summary
APPENDIX B: APPENDIX BBuilding a Lab Environment Using Docker
Docker Technology
Summary
Index
Title Page
Copyright
About the Author
About the Technical Editor
Acknowledgments
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →