Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Kali Linux 2018: Windows Penetration Testing

You're reading from   Kali Linux 2018: Windows Penetration Testing Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018

Arrow left icon
Product type Paperback
Published in Oct 2018
Publisher
ISBN-13 9781788997461
Length 404 pages
Edition 2nd Edition
Arrow right icon
Authors (2):
Arrow left icon
Wolf Halton Wolf Halton
Author Profile Icon Wolf Halton
Wolf Halton
Bo Weaver Bo Weaver
Author Profile Icon Bo Weaver
Bo Weaver
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Choosing Your Distro FREE CHAPTER 2. Sharpening the Saw 3. Information Gathering and Vulnerability Assessments 4. Sniffing and Spoofing 5. Password Attacks 6. NetBIOS Name Service and LLMNR - Obsolete but Still Deadly 7. Gaining Access 8. Windows Privilege Escalation and Maintaining Access 9. Maintaining Access on Server or Desktop 10. Reverse Engineering and Stress Testing 11. Other Books You May Enjoy

To get the most out of this book

You will require following to code test this book:

  • Router/firewall
  • Linux workstation 8 cores 32 GB RAM for a VM server. (running VirtualBox)
  • Windows 2008 server for the DC (VM)
  • Windows 2008 server file server (VM)
  • Win7 client (VM)
  • Win10 client (This was a physical laptop)
  • Laptop running Kali 4 cores 8 GB of RAM. For the attacking platform. (My personal laptop)

Download the color images

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "This produces a fast scan-the T stands for Timing (from 1 to 5), and the default timing is -T3."

A block of code is set as follows:

html, body, #map {
height: 100%;
margin: 0;
padding: 0
}

Any command-line input or output is written as follows:

nmap -v -sn 192.168.0.0/16 10.0.0.0/8
nmap -v -iR 10000 -Pn -p 80

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Open the Terminal from the icon on the top bar or by clicking on the menu links:
Application | Accessories | Terminal
".

Warnings or important notes appear like this.
Tips and tricks appear like this.
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image