更新时间:2021-07-08 09:42:21
coverpage
Title Page
Copyright
Kali Linux - An Ethical Hacker's Cookbook
Credits
Disclaimer
About the Author
About the Reviewer
www.PacktPub.com
Why subscribe?
Customer Feedback
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Downloading the example code
Downloading the color images of this book
Errata
Piracy
Questions
Kali – An Introduction
Introduction
Configuring Kali Linux
How to do it...
How it works...
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Dnscan
Subbrute
Dirsearch
Pentesting VPN's ike-scan
Cracking the PSK
Setting up proxychains
Using proxychains with tor
Going on a hunt with Routerhunter
Gathering Intel and Planning Attack Strategies
Getting a list of subdomains
Fierce
DNSdumpster
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
Using Nmap to find open ports
Using scripts
Bypassing firewalls with Nmap
TCP ACK scan
TCP Window scan
Idle scan
Searching for open directories
The dirb tool
There's more...
Performing deep magic with DMitry
Hunting for SSL flaws