reklama - zainteresowany?

Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative - Helion

Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative
ebook
Autor: Tanisha L. Turner
Tytuł oryginału: Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative
ISBN: 9781835465417
Format: ebook
Księgarnia: Helion

Cena książki: 129,00 zł

Książka będzie dostępna od października 2024

Parrot Security OS is a Linux distribution designed for cybersecurity, penetration testing, ethical hacking, and general IT security tasks. With plenty of cutting-edge features to suit beginners as well as advanced users, learn how Parrot OS is secure and versatile security testing environment.
This comprehensive guide will give you a full walkthrough of Parrot Security while offering a thorough overview of penetration testing methodology, along with some hints of modern technologies and attack scenarios like web, wireless, and cloud pentesting. Complete with laboratory setup and tutorials, code snippets, and real-world examples, this beginner-friendly book will take you through the foundations of ethical hacking using the Parrot OS. Meanwhile, experienced cybersecurity experts will be able to hands-on with ParrotSec’s powerful features quickly, and your existing knowledge of ethical hacking platforms like Kali Linux will help you master the advanced features and techniques in Parrot OS.
By the end of this book, you’ll have a solid grasp on Parrot Security and will be able to use its features to easily achieve your ethical hacking goals.

Spis treści

Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative eBook -- spis treści

  • 1. Ethical Hacking and Parrot Security and Installing Parrot Security
  • 2. Information Gathering
  • 3. Vulnerability Assessment
  • 4. Password Cracking
  • 5. Network Reconnaissance
  • 6. Hash and Password Dumping
  • 7. Linux Auditing and Privilege Escalation
  • 8. Digital Forensics Imaging
  • 9. Digital Forensics Carving
  • 10. Digital Forensics Reporting
  • 11. Compilation of Ethical Hacking Findings
  • 12. Penetration Testing Reporting

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.