Saturday, February 20, 2016

Kali Linux – Assuring Security by Penetration Testing


Table of Contents
PART I: Lab Preparation and Testing Procedures
Chapter 1: Beginning with Kali Linux
Chapter 2: Penetration Testing Methodology
PART II: Penetration Testers Armory
Chapter 3: Target Scoping
Chapter 4: Information Gathering
Chapter 5: Target Discovery
Chapter 6: Enumerating Target

Chapter 7: Vulnerability Mapping
Chapter 8: Social Engineering
Chapter 9: Target Exploitation
Chapter 10: Privilege Escalation
Chapter 11: Maintaining Access
Chapter 12: Documentation and Reporting
PART III: Extra Ammunition
Appendix A: Supplementary Tools

To download the book please click the download button ...................................
https://drive.google.com/file/d/0B03aHmrU8BfBQTliMmNZVGR0SUE/view?usp=sharing


No comments:

Post a Comment