Penetration Testing: What You Should Know
Getting Comfortable with Kali Linux
The Essential Tools
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning
Buffer Overflows
Windows Buffer Overflow Exploitation
Linux Buffer Overflow Exploitation
Working with Exploits
File Transfers
Privilege Escalation
Client Side Attacks
Web Application Attacks
Password Attacks
Port Redirection and Tunneling
The Metasploit Framework
Bypassing Antivirus Software
Assembling the Pieces: Penetration Test Breakdown
Hedef Kitle
Kolluk Kuvvetleri, SOC Analistleri, Sızma Testi Uzmanları, Ağ ve Sistem Yöneticileri, Yazılımcılar, Öğrenciler...