[Tens de ter uma conta e sessão iniciada para poderes visualizar esta imagem]
Índice:
Part 1: The Attacker’s Kill Chain
Chapter 1: Starting with Kali Linux
Chapter 2: Identifying the Target – Passive Reconnaissance
Chapter 3: Active Reconnaissance and Vulnerability Scanning
Chapter 4: Exploit
Chapter 5: Post Exploit – Action on the Objective
Chapter 6: Post Exploit – Persistence
Part 2: The Delivery Phase
Chapter 7: Physical Attacks and Social Engineering
Chapter 8: Exploiting Wireless Communications
Chapter 9: Reconnaissance and Exploitation of Web-based Applications
Chapter 10: Exploiting Remote Access Communications
Chapter 11: Client-side Exploitation
Download: [Tens de ter uma conta e sessão iniciada para poderes visualizar este link]