Cover
Copyright
About the Author
Contents
Foreword
Acknowledgments
Introduction
Penetration testing Primer
Part I: the BasIcs
Chapter 1: Setting Up Your Virtual Lab
Chapter 2: Using Kali Linux
Chapter 3: Programming
Chapter 4: Using the Metasploit Framework
Part II: assessments
Chapter 5: Information Gathering
Chapter 6: Finding Vulnerabilities
Chapter 7: Capturing Traffic
Part III: attacks
Chapter 8: Exploitation
Chapter 9: Password Attacks
Chapter10: Client-Side Exploitation
Chapter 11: Social Engineering
Chapter 12: Bypassing Antivirus Applications
Chapter 13: Post Exploitation
Chapter 14: Web Application Testing
Chapter 15: Wireless Attacks
Part IV: exPloIt DeVeloPment
Chapter 16: A Stack-Based Buffer Overflow in Linux
Chapter 17: A Stack-Based Buffer Overflow in Windows
Chapter 18: Structured Exception Handler Overwrites
Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules
Part V: moBIle hackInG
Chapter 20: Using the Smartphone Pentest Framework
Index