The Social Engineering Toolkit (SET) is an advanced, multifunctional, and easy-to-use computer-assisted social engineering toolset created by the founders of TrustedSec (https://www.trustedsec.com/). It helps you prepare the most effective way to exploit client-side application vulnerabilities, and makes a fascinating attempt to capture the target's confidential information (for example, email passwords). Some of the most efficient and useful attack methods employed by SET include targeted phishing emails with a malicious file attachment, Java applet attacks, browser-based exploitation, gathering website credentials, creating infectious portable media (USB/DVD/CD), mass-mailer attacks, and other similar multi-attack web vectors. This combination of attack methods provides you with a powerful platform to utilize and select the most persuasive technique...
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux 2018: Assuring Security by Penetration Testing
By :

Kali Linux 2018: Assuring Security by Penetration Testing
By:
Overview of this book
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.
This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You’ll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you’ll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you’ll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You’ll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.
By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.
Table of Contents (17 chapters)
Preface
In Progress
| 0 / 5 sections completed |
0%
Installing and Configuring Kali Linux
In Progress
| 0 / 11 sections completed |
0%
Setting Up Your Test Lab
In Progress
| 0 / 11 sections completed |
0%
Penetration Testing Methodology
In Progress
| 0 / 5 sections completed |
0%
Footprinting and Information Gathering
In Progress
| 0 / 13 sections completed |
0%
Scanning and Evasion Techniques
In Progress
| 0 / 15 sections completed |
0%
Vulnerability Scanning
In Progress
| 0 / 8 sections completed |
0%
Social Engineering
In Progress
| 0 / 7 sections completed |
0%
Target Exploitation
In Progress
| 0 / 9 sections completed |
0%
Privilege Escalation and Maintaining Access
In Progress
| 0 / 6 sections completed |
0%
Web Application Testing
In Progress
| 0 / 8 sections completed |
0%
Wireless Penetration Testing
In Progress
| 0 / 8 sections completed |
0%
Mobile Penetration Testing with Kali NetHunter
In Progress
| 0 / 12 sections completed |
0%
PCI DSS Scanning and Penetration Testing
In Progress
| 0 / 7 sections completed |
0%
Tools for Penetration Testing Reporting
In Progress
| 0 / 10 sections completed |
0%
Assessments
In Progress
| 0 / 9 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 2 sections completed |
0%
Customer Reviews