Chapter
Chapter 1: Kali – An Introduction
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Pentesting VPN's ike-scan
Using proxychains with tor
Going on a hunt with Routerhunter
Chapter 2: Gathering Intel and Planning Attack Strategies
Getting a list of subdomains
Using Shodan for fun and profit
Using Nmap to find open ports
Bypassing firewalls with Nmap
Searching for open directories
Performing deep magic with DMitry
Exploring connections with intrace
Digging deep with theharvester
Finding the technology behind web apps
Scanning IPs with masscan
Sniffing around with Kismet
Testing routers with firewalk
Chapter 3: Vulnerability Assessment
Exploiting WSDLs with Wsdler
Web app pentest with Vega
Exploiting routers with RouterSploit
Using the scanners command
Writing a custom resource script
Chapter 4: Web App Exploitation – Beyond
Exploiting XSS with XSS Validator
Injection attacks with sqlmap
Owning all .svn and .git repositories
Exploiting JBoss with JexBoss
Exploiting PHP Object Injection
Backdoors using web shells
Backdoors using meterpreters
Chapter 5: Network Exploitation on Current Exploitation
Man in the middle with hamster and ferret
Using the paranoid meterpreter
A tale of a bleeding heart
Say no to SQL – owning MongoDBs
Chapter 6: Wireless Attacks – Getting Past
Owning employee accounts with Ghost Phisher
Chapter 7: Password Attacks – The Fault
Identifying different types of hash in the wild!
Playing with John the ripper
Generating word list with crunch
Chapter 8: Have Shell Now What?
Privilege escalation on Windows
Pulling plaintext passwords with mimikatz
Dumping other saved passwords from the machine
Pivoting into the network
Backdooring for persistence
Chapter 9: Buffer Overflows
Exploiting stack-based buffer overflows
Exploiting buffer overflow on real software
An overview of ASLR and NX bypass
Chapter 10: Playing with Software-Defined Radios
Hands-on with RTLSDR scanner
Kalibrating device for GSM tapping
Decoding ADS-B messages with Dump1090
Chapter 11: Kali in Your Pocket –NetHunters and Raspberries
Installing Kali on Raspberry Pi
Superman typing – HID attacks
Setting up an evil access point
Chapter 12: Writing Reports
Generating reports using Dradis