O'Reilly logo

Hacking with Kali by Andrew Bindner, James Broad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1

Introduction

This chapter introduces the purpose of the book and key learning points. It introduces the chapters of the book and appendixes and desired outcome for readers of the book. This chapter also will introduce common definitions used in the penetration testing field.

Keywords

Introduction; penetration testing; gray hat; white hat; black hat; pentest; vulnerability test; vulnerability analysis; vulnerability; threat; risk; social engineering; phishing; spear phishing; dumpster diving; red team; red teaming; malicious user testing; maluser

Information in This Chapter

ent Book Overview and Key Learning Points

 Book Audience

 Diagrams, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required