reklama - zainteresowany?

Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking - Helion

Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking
ebook
Autor: Ric Messier
ISBN: 978-14-920-2865-9
stron: 402, Format: ebook
Data wydania: 2018-07-17
Księgarnia: Helion

Cena książki: 160,65 zł (poprzednio: 186,80 zł)
Oszczędzasz: 14% (-26,15 zł)

Dodaj do koszyka Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking

Tagi: Linux

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.

  • Learn tools for stress testing network stacks and applications
  • Perform network reconnaissance to determine what’s available to attackers
  • Execute penetration tests using automated exploit tools such as Metasploit
  • Use cracking tools to see if passwords meet complexity requirements
  • Test wireless capabilities by injecting frames and cracking passwords
  • Assess web application vulnerabilities with automated or proxy-based tools
  • Create advanced attack techniques by extending Kali tools or developing your own
  • Use Kali Linux to generate reports once testing is complete


Dodaj do koszyka Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking

 

Osoby które kupowały "Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking", wybierały także:

  • Bash. Techniki zaawansowane. Kurs video. ZostaÅ„ administratorem systemów IT
  • Administracja systemem Linux. Kurs video. Przewodnik dla poczÄ…tkujÄ…cych
  • Gray Hat C#. JÄ™zyk C# w kontroli i Å‚amaniu zabezpieczeÅ„
  • Python dla administrator
  • Cybersecurity dla ka

Dodaj do koszyka Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking

Spis treści

Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking eBook -- spis treści

  • Preface
    • What This Book Covers
    • Who This Book Is For
    • The Value and Importance of Ethics
    • Conventions Used in This Book
    • Using Code Examples
    • OReilly Safari
    • How to Contact Us
    • Acknowledgments
  • 1. Foundations of Kali Linux
    • Heritage of Linux
    • About Linux
    • Acquiring and Installing Kali Linux
    • Desktops
      • GNOME Desktop
      • Logging In Through the Desktop Manager
      • Xfce Desktop
      • Cinnamon and MATE
    • Using the Command Line
      • File and Directory Management
      • Process Management
      • Other Utilities
    • User Management
    • Service Management
    • Package Management
    • Log Management
    • Summary
    • Useful Resources
  • 2. Network Security Testing Basics
    • Security Testing
    • Network Security Testing
      • Monitoring
      • Layers
      • Stress Testing
      • Denial-of-Service Tools
        • Slowloris attack
        • SSL-based stress testing
        • DHCP attacks
    • Encryption Testing
    • Packet Captures
      • Using tcpdump
      • Berkeley Packet Filters
      • Wireshark
    • Poisoning Attacks
      • ARP Spoofing
      • DNS Spoofing
    • Summary
    • Useful Resources
  • 3. Reconnaissance
    • What Is Reconnaissance?
    • Open Source Intelligence
      • Google Hacking
      • Automating Information Grabbing
      • Recon-NG
      • Maltego
    • DNS Reconnaissance and whois
      • DNS Reconnaissance
        • Using nslookup and dig
        • Automating DNS recon
      • Regional Internet Registries
        • Using whois
    • Passive Reconnaissance
    • Port Scanning
      • TCP Scanning
      • UDP Scanning
      • Port Scanning with Nmap
      • High-Speed Scanning
    • Service Scanning
      • Manual Interaction
    • Summary
    • Useful Resources
  • 4. Looking for Vulnerabilities
    • Understanding Vulnerabilities
    • Vulnerability Types
      • Buffer Overflow
      • Race Condition
      • Input Validation
      • Access Control
    • Local Vulnerabilities
      • Using lynis for Local Checks
      • OpenVAS Local Scanning
      • Root Kits
    • Remote Vulnerabilities
      • Quick Start with OpenVAS
      • Creating a Scan
      • OpenVAS Reports
    • Network Device Vulnerabilities
      • Auditing Devices
      • Database Vulnerabilities
    • Identifying New Vulnerabilities
    • Summary
    • Useful Resources
  • 5. Automated Exploits
    • What Is an Exploit?
    • Cisco Attacks
      • Management Protocols
      • Other Devices
    • Exploit Database
    • Metasploit
      • Starting with Metasploit
      • Working with Metasploit Modules
      • Importing Data
      • Exploiting Systems
    • Armitage
    • Social Engineering
    • Summary
    • Useful Resources
  • 6. Owning Metasploit
    • Scanning for Targets
      • Port Scanning
      • SMB Scanning
      • Vulnerability Scans
    • Exploiting Your Target
    • Using Meterpreter
      • Meterpreter Basics
      • User Information
      • Process Manipulation
    • Privilege Escalation
    • Pivoting to Other Networks
    • Maintaining Access
    • Summary
    • Useful Resources
  • 7. Wireless Security Testing
    • The Scope of Wireless
      • 802.11
      • Bluetooth
      • Zigbee
    • WiFi Attacks and Testing Tools
      • 802.11 Terminology and Functioning
      • Identifying Networks
      • WPS Attacks
      • Automating Multiple Tests
      • Injection Attacks
    • Password Cracking on WiFi
      • besside-ng
      • coWPAtty
      • Aircrack-ng
      • Fern
    • Going Rogue
      • Hosting an Access Point
      • Phishing Users
      • Wireless Honeypot
    • Bluetooth Testing
      • Scanning
      • Service Identification
      • Other Bluetooth Testing
    • Zigbee Testing
    • Summary
    • Useful Resources
  • 8. Web Application Testing
    • Web Architecture
      • Firewall
      • Load Balancer
      • Web Server
      • Application Server
      • Database Server
    • Web-Based Attacks
      • SQL Injection
      • XML Entity Injection
      • Command Injection
      • Cross-Site Scripting
      • Cross-Site Request Forgery
      • Session Hijacking
    • Using Proxies
      • Burp Suite
      • Zed Attack Proxy
      • WebScarab
      • Paros Proxy
      • Proxystrike
    • Automated Web Attacks
      • Recon
      • Vega
      • nikto
      • dirbuster and gobuster
      • Java-Based Application Servers
    • SQL-Based Attacks
    • Assorted Tasks
    • Summary
    • Useful Resources
  • 9. Cracking Passwords
    • Password Storage
      • Security Account Manager
      • PAM and Crypt
    • Acquiring Passwords
    • Local Cracking
      • John the Ripper
      • Rainbow Tables
        • ophcrack
        • RainbowCrack project
      • HashCat
    • Remote Cracking
      • Hydra
      • Patator
    • Web-Based Cracking
    • Summary
    • Useful Resources
  • 10. Advanced Techniques and Concepts
    • Programming Basics
      • Compiled Languages
      • Interpreted Languages
      • Intermediate Languages
      • Compiling and Building
    • Programming Errors
      • Buffer Overflows
      • Heap Overflows
      • Return to libc
    • Writing Nmap Modules
    • Extending Metasploit
    • Disassembling and Reverse Engineering
      • Debugging
      • Disassembling
      • Tracing Programs
      • Other File Types
    • Maintaining Access and Cleanup
      • Metasploit and Cleanup
      • Maintaining Access
    • Summary
    • Useful Resources
  • 11. Reporting
    • Determining Threat Potential and Severity
    • Writing Reports
      • Audience
      • Executive Summary
      • Methodology
      • Findings
    • Taking Notes
      • Text Editors
      • GUI-Based Editors
      • Notes
      • Capturing Data
    • Organizing Your Data
      • Dradis Framework
      • CaseFile
    • Summary
    • Useful Resources
  • Index

Dodaj do koszyka Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.