Book Content
chapters • 8h40m total length
1. Setting Up Kali Linux and Pentesting Environment
2. Customizing Kali Linux
3. Understanding Kali Linux Tools
4. Learning About Your Target
5. Vulnerability Assessment
6. Exploiting Vulnerabilities
7. Escalating Privileges
8. Password Attacks
9. Wireless Attacks
10. Performing a Network Audit














