This book is a hands-on guide for getting the most from Kali Linux for pen testing. Working cybersecurity professionals in any of the offensive hands on roles known as pen testers, red teamers, white hat hackers, and ethical hackers. Defensive specialists will also find this valuable as they need to know the tools used by attackers.
The book will cover the following topics:
- Building a modern dockerized environment
- Learn the basics of bash language in Linux
- Find Vulnerabilities in different ways (OSINT, Network Scan, Vulnerabilities Assessments ...)
- Analyze their findings and identify false positives
- Apply practical penetration testing workflows
- Learn about Modern Web Application Security Secure SDLC
- Penetration Test Automation with Python
- Handling advanced subjects (Buffer Overflow, Lateral movement, Privilege Escalation ...)