Kali Linux Network Scanning Cookbook HD PDF

This article is the original content of AppNee. All rights reserved. To repost or reproduce, please make a footnote with our article link!

Today, at this moment of rapid development of Internet and increasingly serious intrusion behaviors to network, the network security naturally became a focus in IT field. Accordingly, the network scanning technology has also become the most important one in this field. With help of Kali Linux OS’s built-in abundant powerful network scanning tools, each guy full of passion can become network security expert.

Network scanning is an advanced technology with extremely high operability. Through network scanning, we can find and grasp the distribution condition of all kinds of service ports opening on the target host, open services, service software along with its version and corresponding published vulnerabilities, and other aspects of safety related information, so as to initiate all necessary preparation for further network attacks. The basic flow of general network scanning and attack is as follows:

  1. Find a target host
  2. Open ports scanning
  3. Fingerprint information scanning
  4. Vulnerability scanning
  5. Implement penetration attacks

According to the general process above, Kali Linux Network Scanning Cookbook teaches you how to use a variety of tools in Kali Linux to implement network penetrations step by step. And when finish this book, you will master how to use many tools specially designed for network scanning and attack, including Scapy, Arping, Fping, NetDiscover, Metasploit, ICMP ping, Netcat, Nmap (NSE), Amap, xProbe2, Dmitry, p0f, Nessus, Burp Suite, snmpwalk, SSLScan, SSLyze, sqlmap, etc.

// Acquirable Skills //

  1. Develop a network-testing environment that can be used to test scanning tools and techniques
  2. Understand the underlying principles of network scanning technologies by building custom scripts and tools
  3. Perform comprehensive scans to identify listening on TCP and UDP sockets
  4. Examine remote services to identify type of service, vendor, and version
  5. Evaluate denial of service threats and develop an understanding of how common denial of service attacks are performed
  6. Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them

// Table Of Contents //

  • Getting Started
  • Discovery Scanning
  • Port Scanning
  • Fingerprinting
  • Vulnerability Scanning
  • Denial of Service
  • Web Application Scanning
  • Automating Kali Tools

// Book Example Codes //

// Download URLs //

 (4.57 MB | Homepage)