In this section, you will start actively working with the various tools within Kali Linux. You will learn how to perform a multitude of tasks spanning across the various stages of a penetration test. The aim here is to exploit the target, so we will be working with attacks focused on social engineering, Metasploit, and more. We will cover multiple technologies here, such as wireless networks and web applications.
The following chapters will be covered in this section:
- Chapter 3, Performing Information Gathering
- Chapter 4, Mastering Social Engineering
- Chapter 5, Diving into the Metasploit Framework
- Chapter 6, Understanding Password Attacks
- Chapter 7, Working with Burp Suite
- Chapter 8, Attacking Web Applications
- Chapter 9, Getting Started with Wireless Attacks