更新时间:2021-07-16 18:08:25
封面
Title Page
Copyright and Credits
Learn Ethical Hacking from Scratch
Dedication
Packt Upsell
Why subscribe?
PacktPub.com
Contributors
About the author
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Conventions used
Get in touch
Reviews
Introduction
What's in this book?
Preparation
Penetration testing
Network penetration testing
Gaining access
Post exploitation
Website penetration testing
Protecting your system
What is hacking?
Why should we learn about hacking?
A glimpse of hacking
Browser exploitation framework
Accessing the target computer's webcam
Summary
Setting Up a Lab
Lab overview
VirtualBox
Installation of VirtualBox
Installing Kali Linux
Installing Metasploitable
Installing Windows
Creating and using snapshots
Linux Basics
Overview of Kali Linux
Status bar icons
Connecting the wireless card
Linux commands
Commands
The ls command
The man command
The help command
The Tab button
Updating resources
Network Penetration Testing
What is a network?
Network basics
Connecting to a wireless adapter
MAC addresses
Wireless modes – managed and monitor
Enabling monitor mode manually
Enabling monitor mode using airmon-ng
Pre-Connection Attacks
Packet sniffing basics
Targeted packet sniffing
Deauthentication attack
What is a fake access point?
Creating fake access points with the MANA Toolkit
Network Penetration Testing - Gaining Access
WEP theory
Basic web cracking
Fake authentication attack
ARP request replay
WPA introduction
WPS cracking
Handshake theory
Capturing the handshake
Creating a wordlist
Wordlist cracking
Securing network from attacks
Post-Connection Attacks
Post-connection attacks
The netdiscover tool
The AutoScan tool
Zenmap
Man-in-the-Middle Attacks
Man-in-the–middle attacks
ARP spoofing using arpspoof
ARP spoofing using MITMf
Bypassing HTTPS
Session hijacking
DNS spoofing
MITMf screenshot keylogger
MITMf code injection
MITMf against a real network