• Network Security
  • Introduction
  • 0. Abstract
  • 1. Introduction
  • 2. Kali Linux
    • 2.1 Nmap
    • 2.2 Metasploit
      • 2.2.1 Armitage
    • 2.3 tcpdump
    • 2.4 Wireshark
    • 2.5 xspy, xkey & Xwatchwin
  • 3. Additional Penetration Testing Tools
  • 4. Attacking Targets
    • 4.1 Target 0
    • 4.2 Target 1
    • 4.3 Target 2
    • 4.4 Target 4
    • 4.5 Target 5
    • 4.6 Target 6
    • 4.7 Target 9
    • 4.8 Target 10
  • 5.Attacks on other groups
    • 5.1 Phishing
  • 6. Network IDS
  • 7. Conclusion
  • References
Powered by GitBook

References

References


  • https://www.cisco.com/c/en/us/products/security/what-is-network-security.html

  • https://www.digitalocean.com/community/tutorials/how-to-install-bro-on-ubuntu-16-04

  • https://cyruslab.net/2012/03/06/metasploit-gaining-remote-access-to-windows-xp/

  • https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

results matching ""

    No results matching ""