Back to Blog
Startx samsclass.info6/7/2023 ![]() Recon-NG Command Line Interface (Recon-cli) Chapter 5 Shodan Why scan your network with Shodan? Shodan Features Shodan Website Search Shodan Exploits Shodan Maps Shodan ICS Radar More Advanced ways to use Shodan Shodan CLI Shodan Searches with Metasploit Chapter 6 Additional Recon Tools DMitry Sparta Netdiscover Zenmap Metasploit Chapter 7 Introduction to Metasploit Metasploit Overview 1 - Picking an Exploit 2 - Setting Exploit Options Multiple Target Types Getting a remote shell on a Windows XP Machine Picking a Payload Setting Payload Options Running the Exploit Getting a remote shell on a Windows 7 Machine Chapter 8 Table of Contents Introduction and Installing Chapter 1 What is Kali Linux? Ethical Hacking Issues Chapter 2 Installing Virtual Machines Install VMware Player & Kali Setting the Kali IP address Installing VMware Tools for Linux Installing Metasploitable 2 Windows 7 Virtual Machine Chapter 3 Introduction to Kali Linux Desktop Overview Applications Menu Command Line Tools Places Menu Upgrading Information Gathering Chapter 4 Reconnaissance with Recon-NG Recon-NG Recon-NG Database Usage Detecting Host Names Using Bing Adding API Keys Recovering Data from Compromised Site Lists Advanced Recon-NG: Pushpins Timothy James Asher - Security Researcher, CTF player & Blogger. He retired from the US Army in late 2013, and currently teaches information technology - focused courses at the University of Maryland Baltimore County Training Centers. Tim Finholm - Bachelor of Science in Computer Science from Hawaii Pacific University and holds several certifications including Certified Ethical Hacker and Security+. DieterleĮ-mail: Website: Twitter: the Reviewers A special thanks to the book reviewers, your time, insight and input was greatly appreciated.īill Marcy – Fellow author and friend. ![]() Daniel has assisted with numerous security training classes and technical training books mainly based on Backtrack and Kali Linux. His articles have been published in international security magazines, and referenced by both technical entities and the media. For about the last 6 years Daniel has been completely focused on security as a computer security researcher and author. He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League school’s computer support department and served as an executive at an electrical engineering company. During this time he worked for a computer support company where he provided system and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. Dieterle has worked in the IT field for over 20 years. “Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves.” - Matthew 10:16 (KJV)Ībout the Author Daniel W. ![]() “The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.” – Sun Tzu ISBN-13: 978-1530506569 ISBN-10: 1530506565ĭedication Thanks to my family for their unending support and prayer, you are truly a gift from God! Thanks to all my friends in the infosec and cybersecurity community for sharing your knowledge and time with me.And lastly a special thank you to Josh and Mike, a lot of the chapter transformations were due to the Josh’s feedback and without you two I would have never heard of Social Engineering Bio-Warfare, lol! Daniel Dieterle All trademarks, registered trademarks and logos are the property of their respective owners. ![]() No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher. Cover Layout by Daniel Dieterle Cover Photo Design by Moriah Dieterle Copyright © 2016 by Daniel W.
0 Comments
Read More
Leave a Reply. |