Instant Kali Linux:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham [UK]
Packt Publishing
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 UBY01 |
Beschreibung: | Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 -- download and boot; Step 2 -- setting the dual boot; Step 3 -- beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start -- getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing Working with vulnerability assessment toolsWeb app penetration testing in Kali; WebScarab proxy; Attacking the database using sqlninja; The Websploit framework; Breaking passwords; John the Ripper; Working with RainbowCrack; Targeting wireless networks; Working with Kismet; Fern WIFI Cracker; Bluetooth auditing; Exploitation frameworks and tools; Browser Exploitation Framework; Social Engineer Toolkit; Working with forensics tools; Autopsy Forensic Browser; The Sleuth Kit; Top 5 features you need to know about; Information gathering with Nmap; Breaking wireless passwords using Aircrack Web app penetration testing with Burp SuiteBurp proxy; Burp Spider; Burp Intruder; Metasploit Exploitation Framework; Features of Metasploit; Network forensics using Kali Linux; Network analysis with Wireshark; Rootkit-scanning forensics with chkrootkit; File analysis using md5deep; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques. If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la |
ISBN: | 9781461949695 1461949696 130607052X 9781306070522 9781849695671 1849695679 9781849695664 1849695660 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043777387 | ||
003 | DE-604 | ||
005 | 20191105 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781461949695 |9 978-1-4619-4969-5 | ||
020 | |a 1461949696 |9 1-4619-4969-6 | ||
020 | |a 130607052X |9 1-306-07052-X | ||
020 | |a 9781306070522 |9 978-1-306-07052-2 | ||
020 | |a 9781849695671 |9 978-1-84969-567-1 | ||
020 | |a 1849695679 |9 1-84969-567-9 | ||
020 | |a 9781849695664 |9 978-1-84969-566-4 | ||
020 | |a 1849695660 |9 1-84969-566-0 | ||
035 | |a (ZDB-4-EBA)ocn862376035 | ||
035 | |a (ZDB-4-ITC)ocn862376035 | ||
035 | |a (OCoLC)862376035 | ||
035 | |a (DE-599)BVBBV043777387 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 |a DE-706 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Singh, Abhinav |e Verfasser |4 aut | |
245 | 1 | 0 | |a Instant Kali Linux |
264 | 1 | |a Birmingham [UK] |b Packt Publishing |c 2013 | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 -- download and boot; Step 2 -- setting the dual boot; Step 3 -- beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start -- getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing | ||
500 | |a Working with vulnerability assessment toolsWeb app penetration testing in Kali; WebScarab proxy; Attacking the database using sqlninja; The Websploit framework; Breaking passwords; John the Ripper; Working with RainbowCrack; Targeting wireless networks; Working with Kismet; Fern WIFI Cracker; Bluetooth auditing; Exploitation frameworks and tools; Browser Exploitation Framework; Social Engineer Toolkit; Working with forensics tools; Autopsy Forensic Browser; The Sleuth Kit; Top 5 features you need to know about; Information gathering with Nmap; Breaking wireless passwords using Aircrack | ||
500 | |a Web app penetration testing with Burp SuiteBurp proxy; Burp Spider; Burp Intruder; Metasploit Exploitation Framework; Features of Metasploit; Network forensics using Kali Linux; Network analysis with Wireshark; Rootkit-scanning forensics with chkrootkit; File analysis using md5deep; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter | ||
500 | |a Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques. If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Computers / Access control | |
650 | 7 | |a COMPUTERS / Operating Systems / Linux |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers |x Access control | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029188447 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227 |l UBY01 |p ZDB-4-ITC |q UBY_PDA_ITC_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176604939681792 |
---|---|
any_adam_object | |
author | Singh, Abhinav |
author_facet | Singh, Abhinav |
author_role | aut |
author_sort | Singh, Abhinav |
author_variant | a s as |
building | Verbundindex |
bvnumber | BV043777387 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn862376035 (ZDB-4-ITC)ocn862376035 (OCoLC)862376035 (DE-599)BVBBV043777387 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04123nmm a2200541zc 4500</leader><controlfield tag="001">BV043777387</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461949695</subfield><subfield code="9">978-1-4619-4969-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1461949696</subfield><subfield code="9">1-4619-4969-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">130607052X</subfield><subfield code="9">1-306-07052-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306070522</subfield><subfield code="9">978-1-306-07052-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849695671</subfield><subfield code="9">978-1-84969-567-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849695679</subfield><subfield code="9">1-84969-567-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849695664</subfield><subfield code="9">978-1-84969-566-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849695660</subfield><subfield code="9">1-84969-566-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn862376035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn862376035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862376035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043777387</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Abhinav</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Instant Kali Linux</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham [UK]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 -- download and boot; Step 2 -- setting the dual boot; Step 3 -- beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start -- getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Working with vulnerability assessment toolsWeb app penetration testing in Kali; WebScarab proxy; Attacking the database using sqlninja; The Websploit framework; Breaking passwords; John the Ripper; Working with RainbowCrack; Targeting wireless networks; Working with Kismet; Fern WIFI Cracker; Bluetooth auditing; Exploitation frameworks and tools; Browser Exploitation Framework; Social Engineer Toolkit; Working with forensics tools; Autopsy Forensic Browser; The Sleuth Kit; Top 5 features you need to know about; Information gathering with Nmap; Breaking wireless passwords using Aircrack</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Web app penetration testing with Burp SuiteBurp proxy; Burp Spider; Burp Intruder; Metasploit Exploitation Framework; Features of Metasploit; Network forensics using Kali Linux; Network analysis with Wireshark; Rootkit-scanning forensics with chkrootkit; File analysis using md5deep; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques. If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Linux</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029188447</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=656227</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-ITC</subfield><subfield code="q">UBY_PDA_ITC_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043777387 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:50Z |
institution | BVB |
isbn | 9781461949695 1461949696 130607052X 9781306070522 9781849695671 1849695679 9781849695664 1849695660 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029188447 |
oclc_num | 862376035 |
open_access_boolean | |
owner | DE-1046 DE-1047 DE-706 |
owner_facet | DE-1046 DE-1047 DE-706 |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA ZDB-4-ITC UBY_PDA_ITC_Kauf |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
spelling | Singh, Abhinav Verfasser aut Instant Kali Linux Birmingham [UK] Packt Publishing 2013 txt rdacontent c rdamedia cr rdacarrier Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 -- download and boot; Step 2 -- setting the dual boot; Step 3 -- beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start -- getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing Working with vulnerability assessment toolsWeb app penetration testing in Kali; WebScarab proxy; Attacking the database using sqlninja; The Websploit framework; Breaking passwords; John the Ripper; Working with RainbowCrack; Targeting wireless networks; Working with Kismet; Fern WIFI Cracker; Bluetooth auditing; Exploitation frameworks and tools; Browser Exploitation Framework; Social Engineer Toolkit; Working with forensics tools; Autopsy Forensic Browser; The Sleuth Kit; Top 5 features you need to know about; Information gathering with Nmap; Breaking wireless passwords using Aircrack Web app penetration testing with Burp SuiteBurp proxy; Burp Spider; Burp Intruder; Metasploit Exploitation Framework; Features of Metasploit; Network forensics using Kali Linux; Network analysis with Wireshark; Rootkit-scanning forensics with chkrootkit; File analysis using md5deep; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques. If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la Computer security Computers / Access control COMPUTERS / Operating Systems / Linux bisacsh Computer security fast Computers / Access control fast Computers Access control |
spellingShingle | Singh, Abhinav Instant Kali Linux Computer security Computers / Access control COMPUTERS / Operating Systems / Linux bisacsh Computer security fast Computers / Access control fast Computers Access control |
title | Instant Kali Linux |
title_auth | Instant Kali Linux |
title_exact_search | Instant Kali Linux |
title_full | Instant Kali Linux |
title_fullStr | Instant Kali Linux |
title_full_unstemmed | Instant Kali Linux |
title_short | Instant Kali Linux |
title_sort | instant kali linux |
topic | Computer security Computers / Access control COMPUTERS / Operating Systems / Linux bisacsh Computer security fast Computers / Access control fast Computers Access control |
topic_facet | Computer security Computers / Access control COMPUTERS / Operating Systems / Linux Computers Access control |
work_keys_str_mv | AT singhabhinav instantkalilinux |