63. Penetration Testing

    Author: Myanmar Ebook Store Genre: »
    Rating

    Part I: The Basics
    Chapter 1: Setting Up Your Virtual Lab
    Chapter 2: Using Kali Linux
    Chapter 3: Programming
    Chapter 4: Using the Metasploit Framework

    Part II: Assessments
    Chapter 5: Information Gathering
    Chapter 6: Finding Vulnerabilities
    Chapter 7: Capturing Traffic

    Part III: Attacks
    Chapter 8: Exploitation
    Chapter 9: Password Attacks
    Chapter10: Client-Side Exploitation
    Chapter 11: Social Engineering
    Chapter 12: Bypassing Antivirus Applications
    Chapter 13: Post Exploitation
    Chapter 14: Web Application Testing
    Chapter 15: Wireless Attacks

    Part IV: Exploit Development
    Chapter 16: A Stack-Based Buffer Overflow in Linux
    Chapter 17: A Stack-Based Buffer Overflow in Windows
    Chapter 18: Structured Exception Handler Overwrites
    Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules

    Part V: Mobile Hacking
    Chapter 20: Using the Smartphone Pentest Framework

    Resources
    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll