Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa - Helion

ebook
Autor: Robert BeggsTytuł oryginału: Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa
ISBN: 9781782163138
stron: 356, Format: ebook
Data wydania: 2014-06-24
Księgarnia: Helion
Cena książki: 152,10 zł (poprzednio: 169,00 zł)
Oszczędzasz: 10% (-16,90 zł)
Osoby które kupowały "Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa", wybierały także:
- Cisco CCNA 200-301. Kurs video. Administrowanie bezpieczeństwem sieci. Część 3 665,00 zł, (39,90 zł -94%)
- Cisco CCNA 200-301. Kurs video. Administrowanie urządzeniami Cisco. Część 2 665,00 zł, (39,90 zł -94%)
- Cisco CCNA 200-301. Kurs video. Podstawy sieci komputerowych i konfiguracji. Część 1 665,00 zł, (39,90 zł -94%)
- Cisco CCNP Enterprise 350-401 ENCOR. Kurs video. Programowanie i automatyzacja sieci 443,33 zł, (39,90 zł -91%)
- CCNP Enterprise 350-401 ENCOR. Kurs video. Mechanizmy kierowania ruchem pakiet 443,33 zł, (39,90 zł -91%)
Spis treści
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual eBook -- spis treÅ›ci
- 0. Preface
- 1. Kali quickstart
- 2. Passive enumeration?
- 3. Active enumeration (including vulnerability scanning)
- 4. Exploitation
- 5. Post Compromise - Data Harvesting, Priv Escalation
- 6. Post Compromise - Maintaining Access, Exfiltration
- 7. Physical security
- 8. Attacking Wireless Communications
- 9. Attacking web-based applications?
- 10. Attacking remote access???
- 11. Client-side exploitation
- 12. Appendix: Creating a test environment?