Book Content
chapters • 17h total length
1. Goal-Based Penetration Testing with Kali Linux
2. Open Source Intelligence and Passive Reconnaissance
3. Active Reconnaissance of the External and Internal Networks
4. Vulnerability Assessment
5. Physical Security and Social Engineering
6. Wireless Attacks
7. Reconnaissance and Exploitation of Web-Based Applic
8. Attacking Remote Access
9. Client-Side Exploitation
10. By-Passing Security Controls
11. Exploitation
12. Action on the Objective
13. Privilege Escalation
14. Command and Control














