Instant Kali Linux:
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Singh, Abhinav (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham [UK] Packt Publishing 2013
Schlagworte:
Online-Zugang:FAW01
FAW02
UBY01
Beschreibung:Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 -- download and boot; Step 2 -- setting the dual boot; Step 3 -- beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start -- getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing
Working with vulnerability assessment toolsWeb app penetration testing in Kali; WebScarab proxy; Attacking the database using sqlninja; The Websploit framework; Breaking passwords; John the Ripper; Working with RainbowCrack; Targeting wireless networks; Working with Kismet; Fern WIFI Cracker; Bluetooth auditing; Exploitation frameworks and tools; Browser Exploitation Framework; Social Engineer Toolkit; Working with forensics tools; Autopsy Forensic Browser; The Sleuth Kit; Top 5 features you need to know about; Information gathering with Nmap; Breaking wireless passwords using Aircrack
Web app penetration testing with Burp SuiteBurp proxy; Burp Spider; Burp Intruder; Metasploit Exploitation Framework; Features of Metasploit; Network forensics using Kali Linux; Network analysis with Wireshark; Rootkit-scanning forensics with chkrootkit; File analysis using md5deep; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques. If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical la
ISBN:9781461949695
1461949696
130607052X
9781306070522
9781849695671
1849695679
9781849695664
1849695660

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!