Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.
This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
CHAPTER 2. Download and Install Kali Linux
CHAPTER 3. Software, Patches, and Upgrades
CHAPTER 4. Configuring Kali Linux
CHAPTER 5. Building a Penetration Testing Lab
CHAPTER 6. Introduction to the Penetration Test Lifecycle
CHAPTER 7. Reconnaissance
CHAPTER 8. Scanning
CHAPTER 9. Exploitation
CHAPTER 10. Maintaining Access
CHAPTER 11. Reports and Templates