This document outlines chapters in a book about using the Kali Linux platform to perform penetration testing and security assessments. It covers beginning with Kali Linux and setting it up, gathering information about targets, discovering targets on networks, enumerating details about targets, mapping vulnerabilities, using social engineering techniques, exploiting targets, escalating privileges on systems, maintaining persistent access, testing wireless networks, using Kali Linux on Android with Nethunter, and lists supplementary tools.
This document outlines chapters in a book about using the Kali Linux platform to perform penetration testing and security assessments. It covers beginning with Kali Linux and setting it up, gathering information about targets, discovering targets on networks, enumerating details about targets, mapping vulnerabilities, using social engineering techniques, exploiting targets, escalating privileges on systems, maintaining persistent access, testing wireless networks, using Kali Linux on Android with Nethunter, and lists supplementary tools.
This document outlines chapters in a book about using the Kali Linux platform to perform penetration testing and security assessments. It covers beginning with Kali Linux and setting it up, gathering information about targets, discovering targets on networks, enumerating details about targets, mapping vulnerabilities, using social engineering techniques, exploiting targets, escalating privileges on systems, maintaining persistent access, testing wireless networks, using Kali Linux on Android with Nethunter, and lists supplementary tools.