ٱٱلجنرٱل صدٱٱم ٱلشرعبيے
السٌّمعَة : 47 تاريخ التسجيل : 19/11/2012 العمر : 34 الموقع : https://m.facebook.com/profile.php?id=465134066889659
| موضوع: كتاب كالي لينكس Kali Linux Cookbook (النشر لاول مرة على الانترنت) الإثنين مايو 12, 2014 8:56 am | |
| كتاب كالي لينكس والذي طال انتظارة مدة طويلة يسرب اخيرا الى احد مواقع تبادل الدورات بين الاعضاء. محتويات الكتاب: - الكود:
-
[LIST] [*]Preface [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 1: Up and Running with Kali Linux [LIST] [*]Introduction [*]Installing to a hard disk drive [*]Installing to a USB drive with persistent memory [*]Installing in VirtualBox [*]Installing VMware Tools [*]Fixing the splash screen [*]Starting network services [*]Setting up the wireless network [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 2: Customizing Kali Linux [LIST] [*]Introduction [*]Preparing kernel headers [*]Installing Broadcom drivers [*]Installing and configuring ATI video card drivers [*]Installing and configuring nVidia video card drivers [*]Applying updates and configuring extra security tools [*]Setting up ProxyChains [*]Directory encryption [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 3: Advanced Testing Lab [LIST] [*]Introduction [*]Getting comfortable with VirtualBox [*]Downloading Windows Targets [*]Downloading Linux Targets [*]Attacking WordPress and other applications [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 4: Information Gathering [LIST] [*]Introduction [*]Service enumeration [*]Determining network range [*]Identifying active machines [*]Finding open ports [*]Operating system fingerprinting [*]Service fingerprinting [*]Threat assessment with Maltego [*]Mapping the network [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 5: Vulnerability Assessment [LIST] [*]Introduction [*]Installing, configuring, and starting Nessus [*]Nessus – finding local vulnerabilities [*]Nessus – finding network vulnerabilities [*]Nessus – finding Linux-specific vulnerabilities [*]Nessus – finding Windows-specific vulnerabilities [*]Installing, configuring, and starting OpenVAS [*]OpenVAS – finding local vulnerabilities [*]OpenVAS – finding network vulnerabilities [*]OpenVAS – finding Linux-specific vulnerabilities [*]OpenVAS – finding Windows-specific vulnerabilities [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 6: Exploiting Vulnerabilities [LIST] [*]Introduction [*]Installing and configuring Metasploitable [*]Mastering Armitage, the graphical management tool for Metasploit [*]Mastering the Metasploit Console (MSFCONSOLE) [*]Mastering the Metasploit CLI (MSFCLI) [*]Mastering Meterpreter [*]Metasploitable MySQL [*]Metasploitable PostgreSQL [*]Metasploitable Tomcat [*]Metasploitable PDF [*]Implementing browser_autopwn [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 7: Escalating Privileges [LIST] [*]Introduction [*]Using impersonation tokens [*]Local privilege escalation attack [*]Mastering the Social Engineering Toolkit (SET) [*]Collecting the victim's data [*]Cleaning up the tracks [*]Creating a persistent backdoor [*]Man In The Middle (MITM) attack [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 8: Password Attacks [LIST] [*]Introduction [*]Online password attacks [*]Cracking HTTP passwords [*]Gaining router access [*]Password profiling [*]Cracking a Windows password using John the Ripper [*]Using dictionary attacks [*]Using rainbow tables [*]Using nVidia Compute Unified Device Architecture (CUDA) [*]Using ATI Stream [*]Physical access attacks [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Chapter 9: Wireless Attacks [LIST] [*]Introduction [*]Wireless network WEP cracking [*]Wireless network WPA/WPA2 cracking [*]Automating wireless network cracking [*]Accessing clients using a fake AP [*]URL traffic manipulation [*]Port redirection [*]Sniffing network traffic [/LIST] [/LIST] [URL="http://www.packtpub.com/kali-linux-cookbook/book#soc"]Up[/URL] [LIST] [*]Index [/LIST]
تحميل الكتاب: Kali Linux Cookbook[/QUOTE] | |
|