更新时间:2021-06-24 14:10:13
coverpage
Title Page
Copyright and Credits
Learn Penetration Testing
Dedication
About Packt
Why subscribe?
Packt.com
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Disclaimer
Section 1: The Basics
Introduction to Penetration Testing
Technical requirements
What is penetration testing?
Stages of a penetration test
Pre-engagement
Scoping
Timelines
Dealing with third parties
Payment
Your "get out of jail free card"
Intelligence gathering
Threat modeling
Vulnerability analysis
Exploitation
Post-exploitation
Reporting
Executive summary
Technical report
Getting started with your lab
Creating virtual machines in VMware Hyper-V and VirtualBox
Microsoft Hyper-V
VMware
VirtualBox
Target machines
Metasploitable
Summary
Questions
Getting Started with Kali Linux
An introduction to Kali Linux
Installing and configuring Kali Linux
Installation
Installing Kali Linux on macOS
Installing Kali Linux using the Windows Subsystem for Linux (WSL)
Installing Kali Linux using VirtualBox
Configuring Kali Linux
Basic commands in Kali Linux
Scripting in Kali Linux
The essential tools of Kali Linux
Nmap
Aircrack-ng
John the Ripper (JTR) and Hydra
SET
Burp Suite
Section 2: Exploitation
Performing Information Gathering
Passive information gathering
Using the internet
Google dorks
Shodan
Shodan scripting
Using Kali Linux
Maltego
Active information gathering
Vulnerability scanning
OpenVAS
Nessus
Capturing traffic
Wireshark
tcpdump
Mastering Social Engineering
What is social engineering?
Pretexting
Phishing
Spear phishing
Tailgating
Social engineering tools
The social engineering toolkit (SET)
Gophish
Modlishka
Wifiphisher