-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Ultimate Kali Linux Book
By :

As an aspiring ethical hacker and penetration tester, there are various techniques, tips, and tricks that are used within the cybersecurity industry. Some of these techniques include creating a reverse connection from your target back to your attacker machine, creating payloads to evade threat detection security solutions, and even monitoring wireless networks.
In this chapter, you will learn about the objectives of performing network penetration testing, the fundamentals of creating both bind and reverse shells, and various antimalware evasion techniques. You will also learn how to manage wireless adapters on Kali Linux.
In this chapter, we will cover the following topics:
Let's dive in!
Change the font size
Change margin width
Change background colour