Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Basic Security Testing with Linux

published on 2014-09-14 07:06:00 UTC by lotaya
Content:

With This Chapers !
Chapter 1 – Introduction
Part 1: Installing and Basic Overview
Chapter 2 – Installing Kali with VMWare Player
Part 2 – Metasploit Tutorial
Chapter 3 – Introduction to Metasploit
Chapter 4 – Meterpreter Shell
Part 3 – Information Gathering & Mapping
Chapter 5 – Recon Tools
Chapter 6 – Shodan
Part 4 - Attacking Hosts
Chapter 7 – Metasploitable Tutorial – Part One
Chapter 8 – Metasploitable – Part Two: Scanners
Chapter 9 – Windows AV Bypass with Veil
Chapter 10 – Windows Privilege Escalation by Bypassing UAC
Chapter 11 – Packet Captures and Man-in-the-Middle Attacks
Chapter 12 – Using the Browser Exploitation Framework
Part 5 - Social Engineering
Chapter 13 – Social Engineering
Chapter 14 – The Social Engineering Toolkit
Chapter 15 – Subterfuge
Part 6 – Password Attacks
Chapter 16 – Cracking Simple LM Hashes
Chapter 17 – Pass the Hash
Chapter 18 – Mimikatz Plain Text Passwords
Chapter 19 – Mimikatz and Utilman
Chapter 20 – Keyscan and Lockout Keylogger
Chapter 21 – HashCat
Chapter 22 – Wordlists
Chapter 23 – Cracking Linux Passwords
Part 7 – Router and Wi-Fi Attacks
Chapter 24 – Router Attacks
Chapter 25 – Wireless Network Attacks
Chapter 26 – Fern WIFI Cracker
Chapter 27 – Wi-Fi Testing with WiFite
Chapter 28 – Kismet
Chapter 29 – Easy Creds
Part 8 – Raspberry Pi
Chapter 30 – Installing Kali on a Raspberry Pi
Chapter 31 – WiFi Pentesting on a Raspberry Pi
Part 9 - Defending your Network
Chapter 32 – Network Defense and Conclusion
Article: Basic Security Testing with Linux - published about 10 years ago.

http://hacking-share.blogspot.com/2014/09/basic-security-testing-with-linux.html   
Published: 2014 09 14 07:06:00
Received: 2023 04 02 10:42:09
Feed: Hacking Share
Source: Hacking Share
Category: Cyber Security
Topic: Cyber Security
Views: 1

Custom HTML Block

Click to Open Code Editor