ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS

ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS

Rating
0
Reviews
0
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS
ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS

App details

Release date

2022-09-28

Last update

2022-09-28

Product ID

9P5N6VRBCJ1B

Categories

Education

About ADVANCED NETWORK PENETRATION TESTING : TOOLS and METHODS

Advanced Network Penetration Testing: Tools and Methods is a detailed guide on the use of several intrusion tools, resources and methods for
Network and Web Penetration Tests. This guide helps to secure networks against intrusion attacks

The contents of the guide include:

  1. Bash Scripting for penetration testing
  2. Mastering The Linux Terminal Window
  3. Penetration Testing Automation using Python
  4. Burp Suites - Vulnerabilities Scanners and Tools
  5. Kali Linux - File System and Packaging Tools
  6. Building a vulnerable Virtual Environments
  7. Owning the Network with Scapy
  8. The Network Raw Sockets and Sniffing
  9. SQL Injection with Shell Access
  10. SQL Injections : Tools and Attacks
  11. Web Application Security: Tools and Attacks
  12. Social Engineering Toolkits
  13. The Metasploit Framework
  14. Brute Force Attack with TCP Hydra
  15. DDoS Attack with MKD3
  16. MiTM Attack with SSLstrip
  17. Basic linux Commands and Shell environments ( C shell (csh) , Korn shell (ksh) )
  18. Linux stream redirection.
  19. Linux directory structure
  20. Linux users and groups
  21. Linux Permission - read, write and execute.
  22. Linux Chmod command - chown & chroot
  23. Linux Attack Vectors
  24. Linux enumeration attack with LinEnum Tools.
  25. Linux Os detection with Nmap.
  26. Linux privilege escalation
  27. Linux privilege checker
  28. Linux kernel exploitation
  29. Linux exploit Suggester
  30. Penetration Testing using Linux Hidden Tools e.t.c

Key features

  • Bash Scripting for penetration testing
  • Penetration Testing Automation using Python
  • Burp Suites - Vulnerabilities Scanners and Tools
  • SQL Injection with Shell Access
  • SQL Injections : Tools and Attacks
  • Social Engineering Toolkits
  • Brute Force Attack with TCP Hydra