Kali Linux Cookbook - Second Edition:
bOver 80 recipes to effectively test your network and boost your career in security/bh2About This Book/h2ulliLearn how to scan networks to find vulnerable computers and servers/liliHack into devices to control them, steal their data, and make them yours/liliTarget wireless networks, databases, and w...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing Limited
2017
|
Ausgabe: | 2 |
Schlagworte: | |
Zusammenfassung: | bOver 80 recipes to effectively test your network and boost your career in security/bh2About This Book/h2ulliLearn how to scan networks to find vulnerable computers and servers/liliHack into devices to control them, steal their data, and make them yours/liliTarget wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux/li/ulh2Who This Book Is For/h2If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linuxh2What You Will Learn/h2ulliAcquire the key skills of ethical hacking to perform penetration testing/liliLearn how to perform network reconnaissance/liliDiscover vulnerabilities in hosts/liliAttack vulnerabilities to take control of workstations and servers/liliUnderstand password cracking to bypass security/liliLearn how to hack into wireless networks/liliAttack web and database servers to exfiltrate data/liliObfuscate your command and control connections to avoid firewall and IPS detection/li/ulh2In Detail/h2Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. |
Beschreibung: | 1 Online-Ressource (438 Seiten) |
ISBN: | 9781784394257 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047069965 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781784394257 |9 978-1-78439-425-7 | ||
035 | |a (ZDB-5-WPSE)9781784394257438 | ||
035 | |a (OCoLC)1227479356 | ||
035 | |a (DE-599)BVBBV047069965 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
100 | 1 | |a Schultz, Corey P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux Cookbook - Second Edition |c Schultz, Corey P. |
250 | |a 2 | ||
264 | 1 | |a Birmingham |b Packt Publishing Limited |c 2017 | |
300 | |a 1 Online-Ressource (438 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a bOver 80 recipes to effectively test your network and boost your career in security/bh2About This Book/h2ulliLearn how to scan networks to find vulnerable computers and servers/liliHack into devices to control them, steal their data, and make them yours/liliTarget wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux/li/ulh2Who This Book Is For/h2If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. | ||
520 | |a This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linuxh2What You Will Learn/h2ulliAcquire the key skills of ethical hacking to perform penetration testing/liliLearn how to perform network reconnaissance/liliDiscover vulnerabilities in hosts/liliAttack vulnerabilities to take control of workstations and servers/liliUnderstand password cracking to bypass security/liliLearn how to hack into wireless networks/liliAttack web and database servers to exfiltrate data/liliObfuscate your command and control connections to avoid firewall and IPS detection/li/ulh2In Detail/h2Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. | ||
520 | |a Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. | ||
650 | 4 | |a COMPUTERS / Security / Networking | |
650 | 4 | |a COMPUTERS / Networking / Network Protocols | |
700 | 1 | |a Perciaccante, Bob |e Sonstige |4 oth | |
912 | |a ZDB-5-WPSE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032476991 |
Datensatz im Suchindex
_version_ | 1804182072341823488 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Schultz, Corey P. |
author_facet | Schultz, Corey P. |
author_role | aut |
author_sort | Schultz, Corey P. |
author_variant | c p s cp cps |
building | Verbundindex |
bvnumber | BV047069965 |
collection | ZDB-5-WPSE |
ctrlnum | (ZDB-5-WPSE)9781784394257438 (OCoLC)1227479356 (DE-599)BVBBV047069965 |
edition | 2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03443nmm a2200349zc 4500</leader><controlfield tag="001">BV047069965</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784394257</subfield><subfield code="9">978-1-78439-425-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781784394257438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227479356</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047069965</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schultz, Corey P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux Cookbook - Second Edition</subfield><subfield code="c">Schultz, Corey P.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing Limited</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (438 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">bOver 80 recipes to effectively test your network and boost your career in security/bh2About This Book/h2ulliLearn how to scan networks to find vulnerable computers and servers/liliHack into devices to control them, steal their data, and make them yours/liliTarget wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux/li/ulh2Who This Book Is For/h2If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linuxh2What You Will Learn/h2ulliAcquire the key skills of ethical hacking to perform penetration testing/liliLearn how to perform network reconnaissance/liliDiscover vulnerabilities in hosts/liliAttack vulnerabilities to take control of workstations and servers/liliUnderstand password cracking to bypass security/liliLearn how to hack into wireless networks/liliAttack web and database servers to exfiltrate data/liliObfuscate your command and control connections to avoid firewall and IPS detection/li/ulh2In Detail/h2Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Network Protocols</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perciaccante, Bob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032476991</subfield></datafield></record></collection> |
id | DE-604.BV047069965 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:34Z |
indexdate | 2024-07-10T09:01:44Z |
institution | BVB |
isbn | 9781784394257 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032476991 |
oclc_num | 1227479356 |
open_access_boolean | |
physical | 1 Online-Ressource (438 Seiten) |
psigel | ZDB-5-WPSE |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing Limited |
record_format | marc |
spelling | Schultz, Corey P. Verfasser aut Kali Linux Cookbook - Second Edition Schultz, Corey P. 2 Birmingham Packt Publishing Limited 2017 1 Online-Ressource (438 Seiten) txt rdacontent c rdamedia cr rdacarrier bOver 80 recipes to effectively test your network and boost your career in security/bh2About This Book/h2ulliLearn how to scan networks to find vulnerable computers and servers/liliHack into devices to control them, steal their data, and make them yours/liliTarget wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux/li/ulh2Who This Book Is For/h2If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linuxh2What You Will Learn/h2ulliAcquire the key skills of ethical hacking to perform penetration testing/liliLearn how to perform network reconnaissance/liliDiscover vulnerabilities in hosts/liliAttack vulnerabilities to take control of workstations and servers/liliUnderstand password cracking to bypass security/liliLearn how to hack into wireless networks/liliAttack web and database servers to exfiltrate data/liliObfuscate your command and control connections to avoid firewall and IPS detection/li/ulh2In Detail/h2Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. COMPUTERS / Security / Networking COMPUTERS / Networking / Network Protocols Perciaccante, Bob Sonstige oth |
spellingShingle | Schultz, Corey P. Kali Linux Cookbook - Second Edition COMPUTERS / Security / Networking COMPUTERS / Networking / Network Protocols |
title | Kali Linux Cookbook - Second Edition |
title_auth | Kali Linux Cookbook - Second Edition |
title_exact_search | Kali Linux Cookbook - Second Edition |
title_exact_search_txtP | Kali Linux Cookbook - Second Edition |
title_full | Kali Linux Cookbook - Second Edition Schultz, Corey P. |
title_fullStr | Kali Linux Cookbook - Second Edition Schultz, Corey P. |
title_full_unstemmed | Kali Linux Cookbook - Second Edition Schultz, Corey P. |
title_short | Kali Linux Cookbook - Second Edition |
title_sort | kali linux cookbook second edition |
topic | COMPUTERS / Security / Networking COMPUTERS / Networking / Network Protocols |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Networking / Network Protocols |
work_keys_str_mv | AT schultzcoreyp kalilinuxcookbooksecondedition AT perciaccantebob kalilinuxcookbooksecondedition |