Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

English | July 17th, 2018 | ISBN: 149202869X | 402 Pages | EPUB (True/HQ) | 18.54 MB

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.

Learn tools for stress testing network stacks and applications
Perform network reconnaissance to determine what's available to attackers
Execute penetration tests using automated exploit tools such as Metasploit
Use cracking tools to see if passwords meet complexity requirements
Test wireless capabilities by injecting frames and cracking passwords
Assess web application vulnerabilities with automated or proxy-based tools
Create advanced attack techniques by extending Kali tools or developing your own
Use Kali Linux to generate reports once testing is complete



[Fast Download] Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Ebooks related to "Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking" :
Code with the Wisdom of the Crowd: Get Better Together with Mob Programming
The Site Reliability Workbook: Practical Ways to Implement SRE
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, Revised
Attribute-Based Access Control (Artech House Information Security and Privacy)
Online Education
Efficient Algorithms for Global Optimization Methods in Computer Vision
Amazon Kindle: Eigene E-Books erstellen und verkaufen
Windows Server 2012 R2 Pocket Consultant: Essentials & Configuration
Data-Driven Process Discovery and Analysis
FuelPHP Application Development Blueprints
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.