Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Cookbook

Kali Linux Cookbook, 9781783289592 (1783289597), Packt Publishing, 2013

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.


  • Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
  • Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
  • Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

What you will learn from this book

  • Install and setup Kali Linux on multiple platforms
  • Customize Kali Linux to your individual needs
  • Locate vulnerabilities with Nessus and OpenVAS
  • Exploit vulnerabilities you've found with Metasploit
  • Learn multiple solutions to escalate privileges on a compromised machine
  • Understand how to use Kali Linux in all phases of a penetration test
  • Crack WEP/WPA/WPA2 encryption
  • Simulate an actual penetration test using Kali Linux


A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is written for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

(HTML tags aren't allowed.)

The Emergence of International Society in the 1920s
The Emergence of International Society in the 1920s

Chronicling the emergence of an international society in the 1920s, Daniel Gorman describes how the shock of the First World War gave rise to a broad array of overlapping initiatives in international cooperation. Though national rivalries continued to plague world politics, ordinary citizens and state officials found common causes in...

JFK and the Unspeakable: Why He Died and Why It Matters
JFK and the Unspeakable: Why He Died and Why It Matters
BRAND NEW HARDBACKWe can know the essential truth of President John F. Kennedy's assassination. That truth can set us free.

Thanks to the pioneer investigators into President Kennedy's murder, the truth-telling of many witnesses, and a recent flood of documents through the JFK Records Act, the truth is available. Not only can the
iPod & iTunes  For Dummies
iPod & iTunes For Dummies
Connect your iPod or iPod mini to your Mac or PC

Here's just what you need to know to have music wherever you go!

Music is the language of love, and now both Mac and Windows lovers can jam with iPod! This handy guide shows you how to set up your iPod, load songs (legally), edit playlists, find your way around the iTunes music...

Understanding Web Services Specifications and the WSE
Understanding Web Services Specifications and the WSE

Explore the emerging specifications—and the latest tools—for implementing advanced Web services using Microsoft technologies. Keep pace with evolving Web services specifications—and get developer-to-developer insights for using them to deliver advanced, interoperable solutions for Microsoft .NET. This guide provides a...

How to Make Real Money in Second Life: Boost Your Business, Market Your Services, and Sell Your Products
How to Make Real Money in Second Life: Boost Your Business, Market Your Services, and Sell Your Products



With a population in the millions and a monthly growth rate of 20 percent, Second Life® is a virtual 3-D world bursting with opportunities in areas like real estate, legal practice, and marketing, corporate connections, and people just like you. This all-in-one...

3D Printed Science Projects: Ideas for your classroom, science fair or home (Technology in Action)
3D Printed Science Projects: Ideas for your classroom, science fair or home (Technology in Action)

Create 3D printable models that can help students from kindergarten through grad school learn math, physics, botany, chemistry, engineering and more. 

This book shows parents and teachers how to use the models inside as starting points for 3D printable explorations. Students can start with these models and vary them for their...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy