Table of Contents
Preface
Section 1: Getting Started with Penetration Testing
Chapter 1: Introduction to Ethical Hacking
Identifying threat actors and their intent
Understanding what matters to threat actors
Time
Resources
Financial factors
Hack value
Discovering cybersecurity terminologies
Exploring the need for penetration testing and its phases
Creating a penetration testing battle plan
Understanding penetration testing approaches
Types of penetration testing
Exploring hacking phases
Reconnaissance or information gathering
Scanning and enumeration
Gaining access
Maintaining access
Covering your tracks
Understanding the Cyber Kill Chain framework
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control (C2) ...
Get The Ultimate Kali Linux Book - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.