Book Content
chapters • 12h32m total length
1. Kali - An Introduction
2. Gathering Intel and Planning Attack Strategies
3. Vulnerability Assessment
4. Web App Exploitation – Beyond OWASP Top 10
5. Network Exploitation on Current Exploitation
6. Wireless Attacks – Getting Past Aircrack-ng
7. Password Attacks – The Fault in Their Stars
8. Have Shell, Now What ?
9. Buffer Overflows
10. Playing with Software Defined Radios
11. Kali in your pocket-Nethunters and raspberries
12. Writing Reports














