Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instant Kali Linux

Instant Kali Linux, 9781849695664 (1849695660), Packt Publishing, 2013

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.

Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.

Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.

What you will learn from this book

  • Install Kali Linux on standalone or virtual machines
  • Understand the file structure of Kali Linux
  • Gather information and scanning using tools like Nmap
  • Undertake vulnerability assessments and penetration testing
  • Work with exploitation frameworks
  • Penetration testing with web applications
  • Break passwords, create backdoors, and rooting etc
  • Complete forensic analysis using Kali


Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.

Who this book is written for

If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical language which requires only a basic knowledge of security assessments and the Linux operating system.

(HTML tags aren't allowed.)

Ultrafast Optics (Wiley Series in Pure and Applied Optics)
Ultrafast Optics (Wiley Series in Pure and Applied Optics)
A comprehensive treatment of ultrafast optics

This book fills the need for a thorough and detailed account of ultrafast optics. Written by one of the most preeminent researchers in the field, it sheds new light on technology that has already had a revolutionary impact on precision frequency metrology, high-speed electrical...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment


  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...

Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Obtain a clear understanding of how routing information and traffic flows on a multivendor network

Routing policies for networks are often complex and not well understood. Many books detail the operation of routing protocols such as OSPF or BGP, but none place the protocols in the context of routing policies and the real world of ISP peering...

Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Wi-Fi, Bluetooth, Zigbee and WiMax
Wi-Fi, Bluetooth, Zigbee and WiMax
The advent of ubiquitous computing and the proliferation of portable computing devices have raised the importance of mobile and wireless networking. Recently, there has been a tremendous interest in broadband wireless access systems, including wireless local area networks (WLANs), broadband wireless access, and wireless personal area networks...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy