Kali Linux 2018: Assuring security by penetration testing: unleash the full potential of Kali Linux 2018, now with updated tools
You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans t...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
October 2018
|
Ausgabe: | Fourth edition |
Schlagworte: | |
Online-Zugang: | FHI01 UBY01 |
Zusammenfassung: | You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. |
Beschreibung: | 1 Online-Ressource (viii, 501 Seiten) Illustrationen (farbig) |
ISBN: | 9781789346626 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047069672 | ||
003 | DE-604 | ||
005 | 20220316 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781789346626 |c Online |9 978-1-78934-662-6 | ||
035 | |a (ZDB-5-WPSE)9781789346626528 | ||
035 | |a (ZDB-221-PCL)9781789346626 | ||
035 | |a (OCoLC)1227478000 | ||
035 | |a (DE-599)BVBBV047069672 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-11 |a DE-706 | ||
100 | 1 | |a Parasram, Shiva V. N |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux 2018: Assuring security by penetration testing |b unleash the full potential of Kali Linux 2018, now with updated tools |c Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali |
250 | |a Fourth edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c October 2018 | |
300 | |a 1 Online-Ressource (viii, 501 Seiten) |b Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. | ||
650 | 4 | |a COMPUTERS / Security / Networking | |
650 | 4 | |a COMPUTERS / Security / Online Safety & | |
650 | 4 | |a Privacy | |
700 | 1 | |a Samm, Alex |e Verfasser |4 aut | |
700 | 1 | |a Boodoo, Damian |e Verfasser |4 aut | |
700 | 1 | |a Johansen, Gerard |e Verfasser |0 (DE-588)1205294872 |4 aut | |
700 | 1 | |a Allen, Lee |e Verfasser |4 aut | |
700 | 1 | |a Heriyanto, Tedi |e Verfasser |4 aut | |
700 | 1 | |a Ali, Shakeel |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78934-176-8 |
912 | |a ZDB-5-WPSE |a ZDB-221-PCL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032476698 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0004992.html |l FHI01 |p ZDB-221-PCL |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0004992.html |l UBY01 |p ZDB-221-PCL |q UBY01_ZDB-221-PCL21 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182071763009536 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Parasram, Shiva V. N Samm, Alex Boodoo, Damian Johansen, Gerard Allen, Lee Heriyanto, Tedi Ali, Shakeel |
author_GND | (DE-588)1205294872 |
author_facet | Parasram, Shiva V. N Samm, Alex Boodoo, Damian Johansen, Gerard Allen, Lee Heriyanto, Tedi Ali, Shakeel |
author_role | aut aut aut aut aut aut aut |
author_sort | Parasram, Shiva V. N |
author_variant | s v n p svn svnp a s as d b db g j gj l a la t h th s a sa |
building | Verbundindex |
bvnumber | BV047069672 |
collection | ZDB-5-WPSE ZDB-221-PCL |
ctrlnum | (ZDB-5-WPSE)9781789346626528 (ZDB-221-PCL)9781789346626 (OCoLC)1227478000 (DE-599)BVBBV047069672 |
edition | Fourth edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02733nmm a2200457 c 4500</leader><controlfield tag="001">BV047069672</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220316 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789346626</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78934-662-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781789346626528</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCL)9781789346626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478000</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047069672</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parasram, Shiva V. N</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux 2018: Assuring security by penetration testing</subfield><subfield code="b">unleash the full potential of Kali Linux 2018, now with updated tools</subfield><subfield code="c">Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">October 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 501 Seiten)</subfield><subfield code="b">Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Online Safety &amp</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samm, Alex</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Boodoo, Damian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johansen, Gerard</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1205294872</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Allen, Lee</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heriyanto, Tedi</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ali, Shakeel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78934-176-8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032476698</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0004992.html</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0004992.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">UBY01_ZDB-221-PCL21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047069672 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:33Z |
indexdate | 2024-07-10T09:01:43Z |
institution | BVB |
isbn | 9781789346626 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032476698 |
oclc_num | 1227478000 |
open_access_boolean | |
owner | DE-573 DE-11 DE-706 |
owner_facet | DE-573 DE-11 DE-706 |
physical | 1 Online-Ressource (viii, 501 Seiten) Illustrationen (farbig) |
psigel | ZDB-5-WPSE ZDB-221-PCL ZDB-221-PCL UBY01_ZDB-221-PCL21 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt |
record_format | marc |
spelling | Parasram, Shiva V. N Verfasser aut Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali Fourth edition Birmingham ; Mumbai Packt October 2018 1 Online-Ressource (viii, 501 Seiten) Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy Samm, Alex Verfasser aut Boodoo, Damian Verfasser aut Johansen, Gerard Verfasser (DE-588)1205294872 aut Allen, Lee Verfasser aut Heriyanto, Tedi Verfasser aut Ali, Shakeel Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-78934-176-8 |
spellingShingle | Parasram, Shiva V. N Samm, Alex Boodoo, Damian Johansen, Gerard Allen, Lee Heriyanto, Tedi Ali, Shakeel Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
title | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools |
title_auth | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools |
title_exact_search | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools |
title_exact_search_txtP | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools |
title_full | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali |
title_fullStr | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali |
title_full_unstemmed | Kali Linux 2018: Assuring security by penetration testing unleash the full potential of Kali Linux 2018, now with updated tools Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali |
title_short | Kali Linux 2018: Assuring security by penetration testing |
title_sort | kali linux 2018 assuring security by penetration testing unleash the full potential of kali linux 2018 now with updated tools |
title_sub | unleash the full potential of Kali Linux 2018, now with updated tools |
topic | COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
work_keys_str_mv | AT parasramshivavn kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT sammalex kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT boodoodamian kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT johansengerard kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT allenlee kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT heriyantotedi kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools AT alishakeel kalilinux2018assuringsecuritybypenetrationtestingunleashthefullpotentialofkalilinux2018nowwithupdatedtools |