Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa - Helion
ebook
Autor: Robert BeggsTytuł oryginału: Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa
ISBN: 9781782163138
stron: 356, Format: ebook
Data wydania: 2014-06-24
Księgarnia: Helion
Cena książki: 152,10 zł (poprzednio: 169,00 zł)
Oszczędzasz: 10% (-16,90 zł)
Osoby które kupowały "Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world exa", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual eBook -- spis treÅ›ci
- 0. Preface
- 1. Kali quickstart
- 2. Passive enumeration?
- 3. Active enumeration (including vulnerability scanning)
- 4. Exploitation
- 5. Post Compromise - Data Harvesting, Priv Escalation
- 6. Post Compromise - Maintaining Access, Exfiltration
- 7. Physical security
- 8. Attacking Wireless Communications
- 9. Attacking web-based applications?
- 10. Attacking remote access???
- 11. Client-side exploitation
- 12. Appendix: Creating a test environment?