Network Penetration Guides and Tools is a detailed guide on the use of several intrusion tools, resources and methods for Network and Web Penetration Tests.
This guide helps to secure networks against intrusion attacks
The contents of the guide include:
1. Bash Scripting for penetration testing
2. Mastering The Linux Terminal Window
3. Penetration Testing Automation using Python
4. Burp Suites - Vulnerabilities Scanners and Tools
5. Kali Linux - File System and Packaging Tools
6. Building a vulnerable Virtual Environments
7. Owning the Network with Scapy
8. The Network Raw Sockets and Sniffing
9. SQL Injection with Shell Access
10. SQL Injections : Tools and Attacks
11. Web Application Security: Tools and Attacks
12. Social Engineering Toolkits
13. The Metasploit Framework
14. Brute Force Attack with TCP Hydra
15. DDoS Attack with MKD3
16. MiTM Attack with SSLstrip
17. Basic linux Commands and Shell environments ( C shell (csh) , Korn shell (ksh) )
18. Linux stream redirection.
19. Linux directory structure
20. Linux users and groups
21. Linux Permission - read, write and execute.
22. Linux Chmod command - chown & chroot
23. Linux Attack Vectors
24. Linux enumeration attack with LinEnum Tools.
25. Linux Os detection with Nmap.
26. Linux privilege escalation
27. Linux privilege checker
28. Linux kernel exploitation
29. Linux exploit Suggester
30. Penetration Testing using Linux Hidden Tools e.t.c