Book Content
chapters • 15h44m total length
1. Kali - An Introduction
2. Gather Intel and Plan Attack Strategies
3. Vulnerability Assessment: Poking for holes
4. Web App Exploitation: Beyond OWASP Top 10
5. Network Exploitation on Current Exploitation
6. Wireless Attacks: Getting Past aircrack-ng
7. Password Attacks: The Fault in Their Stars
8. Have Shell, Now What ?
9. Buffer Overflows
10. Elementary, My Dear Watson - Digital Forensics
11. Playing with Software Defined Radios
12. Kali in your pocket-Nethunters and raspberries
13. Writing Reports














