Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa - Helion
ebook
Autor: Robert BeggsTytuł oryginału: Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa
ISBN: 9781782163138
stron: 356, Format: ebook
Data wydania: 2014-06-24
Księgarnia: Helion
Cena książki: 169,00 zł
Osoby które kupowały "Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker 190,00 zł, (39,90 zł -79%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
Spis treści
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual eBook -- spis treÅ›ci
- 0. Preface
- 1. Kali quickstart
- 2. Passive enumeration?
- 3. Active enumeration (including vulnerability scanning)
- 4. Exploitation
- 5. Post Compromise - Data Harvesting, Priv Escalation
- 6. Post Compromise - Maintaining Access, Exfiltration
- 7. Physical security
- 8. Attacking Wireless Communications
- 9. Attacking web-based applications?
- 10. Attacking remote access???
- 11. Client-side exploitation
- 12. Appendix: Creating a test environment?