Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Cookbook

Buy
Kali Linux Cookbook, 9781783289592 (1783289597), Packt Publishing, 2013

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
  • Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
  • Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

What you will learn from this book

  • Install and setup Kali Linux on multiple platforms
  • Customize Kali Linux to your individual needs
  • Locate vulnerabilities with Nessus and OpenVAS
  • Exploit vulnerabilities you've found with Metasploit
  • Learn multiple solutions to escalate privileges on a compromised machine
  • Understand how to use Kali Linux in all phases of a penetration test
  • Crack WEP/WPA/WPA2 encryption
  • Simulate an actual penetration test using Kali Linux

Approach

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is written for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

(HTML tags aren't allowed.)

The Data Science Design Manual (Texts in Computer Science)
The Data Science Design Manual (Texts in Computer Science)

This engaging and clearly written textbook/reference provides a must-have introduction to the rapidly emerging interdisciplinary field of data science. It focuses on the principles fundamental to becoming a good data scientist and the key skills needed to build systems for collecting, analyzing, and interpreting data.

The...

The eBay Billionaires' Club: Exclusive Secrets for Building an Even Bigger and More Profitable Online Business
The eBay Billionaires' Club: Exclusive Secrets for Building an Even Bigger and More Profitable Online Business
Of the millions of eBay sellers online today, only a handful qualify for membership in a special club consisting of the legendary auction site’s cream-of-the-crop merchants. Collectively, those fortunate enough to join the ranks of this club sell more than $1 billion in merchandise each year and are responsible for more than 70 million annual...
Data Mining on Multimedia Data (Lecture Notes in Computer Science)
Data Mining on Multimedia Data (Lecture Notes in Computer Science)

The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....


How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers

"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015

The H-1B visa is the gateway for the world’s best and...

Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

ASP.NET 2.0 Revealed
ASP.NET 2.0 Revealed

The new version of ASP.NET includes many practical functions and a lot of frequently requested features, including Master Pages, Themes, site navigation, site counters and many more. And with the help of the new provider model, you can now create many functions in so-called zero-code scenarios, without even one line of source code.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy