Penetration Testing A Hands-On Introduction to Hacking

Course Layout

Part I: The Basics
1: Setting Up Your Virtual Lab
2: Using Kali Linux
3: Programming
4: Using the Metasploit Framework
Part II: Assessments
5: Information Gathering
6: Finding Vulnerabilities
7: Capturing Traffic
Part III: Attacks
8: Exploitation
9: Password Attacks
10: Client-Side Exploitation
11: Social Engineering
12: Bypassing Antivirus Applications
13: Post Exploitation
14: Web Application Testing
15: Wireless Attacks

Part IV: Exploit Development
16: A Stack-Based Buffer Overflow in Linux
17: A Stack-Based Buffer Overflow in Windows
18: Structured Exception Handler Overwrites
19: Fuzzing, Porting Exploits, and Metasploit Modules
Part V: Mobile Hacking
20: Using the Smartphone Pentest Framework

Categories: Ebooks

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *