![]() ![]() Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET), w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The Basics of Hacking and Penetration Testing, 2nd Edition.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |