更新时间:2021-06-24 16:00:26
coverpage
Title Page
Copyright and Credits
Kali Linux - An Ethical Hacker's Cookbook Second Edition
About Packt
Why subscribe?
Packt.com
Contributors
About the author
About the reviewers
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Get in touch
Reviews
Disclaimer
Kali - An Introduction
Configuring Kali Linux
How to do it...
How it works...
Configuring the Xfce environment
Configuring the MATE environment
Configuring the LXDE environment
Configuring the E17 environment
Configuring the KDE environment
Prepping with custom tools
Aquatone
Subfinder
There's more...
Zone Walking using DNSRecon
Setting up I2P for anonymity
Pentesting VPN's ike-scan
Cracking the PSK
Setting up proxychains
Using proxychains with Tor
Going on a hunt with Routerhunter
Gathering Intel and Planning Attack Strategies
Getting a list of subdomains
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
Censys
Using Nmap to find open ports
Using scripts
Bypassing firewalls with Nmap
TCP ACK scan (-sA)
TCP Window scan (-sW)
Idle scan
Searching for open directories using GoBuster
Hunting for SSL flaws
Automating brute force with BruteSpray
Digging deep with TheHarvester
Finding technology behind webapps using WhatWeb