Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intermediate Security Testing with Kali Linux 2

Buy

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux 2”, you will learn how hackers find out information about your systems, locate weaknesses in your security and how they gain access to your devices.

This hands-on, step by step learning book doesn’t dwell on the theory of security, but instead walks you through implementing and using the latest security tools that are included in the most popular computer security testing platform, Kali Linux 2.

This book takes off were my first Basic book ends, showing you what has changed in the latest version of Kali Linux. We then cover putting together a penetration testing lab using Windows and Linux based systems.

Next we cover in-depth ways to use Metasploit, by seeing the latest techniques to create backdoor shells and bypassing anti-virus. We also cover automating Metasploit, including scripting based attacks using both Railgun and PowerShell.

In the web application section we cover many of the tools and techniques used against websites. Over 30 tools are covered ranging from scanning to exploiting, including the ever popular BurpSuite.

In the Attacking Smart Devices section we will see how to create virtual phones or tablets, getting remote shells on Android devices and how Wi-Fi and Man-in-The Middle attacks work against smart devices.

Lastly, the book has an entire section of using computer security tools for forensics, an Internet of Things section and an entire chapter devoted to defending your systems.

(HTML tags aren't allowed.)

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Learn Python Visually
Learn Python Visually

Learn Python Visually is a modern breakthrough that makes learning programming more intuitive, easier, and fun. Using the most basic approach to learning that we all inherently know from childhood, "Learn Python VISUALLY" solves the comprehension problem that so many other books cannot seem to bridge. Visual learners retain...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...

Mastering Python Scientific Computing
Mastering Python Scientific Computing

A complete guide for Python programmers to master scientific computing using Python APIs and tools

About This Book

  • The basics of scientific computing to advanced concepts involving parallel and large scale computation are all covered.
  • Most of the Python APIs and tools used in scientific...
OpenStack in Action
OpenStack in Action

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy