Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Network Scanning Cookbook - Second Edition

Buy

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
  • The practical recipes will help you automate menial tasks and build your own script library

Who This Book Is For

This book is for information security professionals and casual security enthusiasts alike. It provides foundational principles if you're a novice, but will also introduce scripting techniques and in-depth analysis if you're more advanced. Whether you are brand new to Kali Linux or a seasoned veteran, this book will help you both understand and ultimately master many of the most powerful and useful scanning techniques in the industry. It is assumed that you have some basic security testing experience.

What You Will Learn

  • Develop a network-testing environment to test scanning tools and techniques
  • Understand the principles of network-scanning tools by building scripts and tools
  • Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited
  • Perform comprehensive scans to identify listening on TCP and UDP sockets
  • Get started with different Kali desktop environments--KDE, MATE, LXDE, and Xfce
  • Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more
  • Evaluate DoS threats and learn how common DoS attacks are performed
  • Learn how to use Burp Suite to evaluate web applications
(HTML tags aren't allowed.)

Pro Angular
Pro Angular

Angular 4.0 updates for this book are now available. Follow the Download source code link for this book on the Apress website.

Get the most from Angular 2, the leading framework for building dynamic JavaScript applications. Best-selling author Adam Freeman begins by describing the MVC...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Introducing Linux Distros
Introducing Linux Distros

Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides....

New Perspectives HTML5 and CSS3: Comprehensive
New Perspectives HTML5 and CSS3: Comprehensive
Now you can master Web page design as you learn from the unique, hands-on approach found in NEW PERSPECTIVES HTML5 AND CSS3: COMPREHENSIVE, 7E. Each tutorial in this complete book challenges you to put into practice the concepts you have just learned. Every tutorial includes a basic statement of the problem, the goals you should achieve, and a...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy