Book Content
chapters • 10h4m total length
1. Introduction to Kali Nethunter
2. Understanding the phases of Pentesting Process
3. Intelligence-Gathering Tools
4. Scanning and Enumeration Tools
5. Penetrating the Target
6. Clearing Tracks and Removing Evidence from a Target
7. Packet Sniffing and Traffic Analysis
8. Targeting Wireless Devices and Networks
9. Avoiding Detection
10. Hardening Techniques and Countermeasures
11. Building a Lab
12. Selecting a Kali Device and Hardware














