Kali Linux 2 /:
Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a p...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2016.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a professional ethical hacker who is looking to expand their offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge of Linux operating systems and the Bash terminal emulator as well as Windows OS and command line, would be highly beneficial. What You Will LearnSet up Kali Linux for pentestingMap and enumerate your Windows networkExploit several common Windows network vulnerabilitiesAttack and defeat password schemes on WindowsDebug and reverse-engineer Windows programsRecover lost files, investigate successful hacks and discover hidden data in innocent-looking filesCatch and hold admin rights on the network, and maintain backdoors into the network after your initial testing is doneIn DetailKali Linux is the premier platform for testing and maintaining Windows security. This book lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities, in order to be able to exploit a system remotely. After this, you will perform web access exploits using tools such as websploit and others. Security is only as strong as the weakest link in the chain, and passwords are often that weak link. So, you will learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you get to grips with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. So, you will not only learn to penetrate the machine, but you will also learn about privilege escalations in Windows. You will also be able to quickly pentest your system and network. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource |
ISBN: | 1782168508 9781782168508 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn974582246 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 170304s2016 enk o 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d MERUC |d CHVBK |d OCLCO |d OCLCF |d OCLCQ |d OCLCA |d OCLCQ |d OCLCO |d N$T |d AGLDB |d STF |d BTN |d AUW |d INTCL |d MHW |d SNK |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ | ||
020 | |a 1782168508 | ||
020 | |a 9781782168508 |q (electronic bk.) | ||
035 | |a (OCoLC)974582246 | ||
050 | 4 | |a QA76.9.A25 |b H35 2016 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.4/32 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Halton, Wolf, |e author. |0 http://id.loc.gov/authorities/names/no2008027672 | |
245 | 1 | 0 | |a Kali Linux 2 / |c Wolf Halton, Bo Weaver. |
260 | |a Birmingham, UK : |b Packt Publishing, |c 2016. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
500 | |a Includes index. | ||
520 | |a Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a professional ethical hacker who is looking to expand their offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge of Linux operating systems and the Bash terminal emulator as well as Windows OS and command line, would be highly beneficial. What You Will LearnSet up Kali Linux for pentestingMap and enumerate your Windows networkExploit several common Windows network vulnerabilitiesAttack and defeat password schemes on WindowsDebug and reverse-engineer Windows programsRecover lost files, investigate successful hacks and discover hidden data in innocent-looking filesCatch and hold admin rights on the network, and maintain backdoors into the network after your initial testing is doneIn DetailKali Linux is the premier platform for testing and maintaining Windows security. This book lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities, in order to be able to exploit a system remotely. After this, you will perform web access exploits using tools such as websploit and others. Security is only as strong as the weakest link in the chain, and passwords are often that weak link. So, you will learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you get to grips with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. So, you will not only learn to penetrate the machine, but you will also learn about privilege escalations in Windows. You will also be able to quickly pentest your system and network. | ||
588 | 0 | |a Print version record. | |
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
700 | 1 | |a Weaver, Bo, |e author. | |
776 | 0 | 8 | |i Print version: |a Halton, Wolf. |t Kali Linux 2: Windows Penetration Testing. |d Birmingham : Packt Publishing, ©2016 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261891 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL4594301 | ||
938 | |a EBSCOhost |b EBSC |n 1261891 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn974582246 |
---|---|
_version_ | 1816882380249497601 |
adam_text | |
any_adam_object | |
author | Halton, Wolf Weaver, Bo |
author_GND | http://id.loc.gov/authorities/names/no2008027672 |
author_facet | Halton, Wolf Weaver, Bo |
author_role | aut aut |
author_sort | Halton, Wolf |
author_variant | w h wh b w bw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 H35 2016 |
callnumber-search | QA76.9.A25 H35 2016 |
callnumber-sort | QA 276.9 A25 H35 42016 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)974582246 |
dewey-full | 005.4/32 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4/32 |
dewey-search | 005.4/32 |
dewey-sort | 15.4 232 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04440cam a2200529 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn974582246</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">170304s2016 enk o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">CHVBK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">AGLDB</subfield><subfield code="d">STF</subfield><subfield code="d">BTN</subfield><subfield code="d">AUW</subfield><subfield code="d">INTCL</subfield><subfield code="d">MHW</subfield><subfield code="d">SNK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782168508</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782168508</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)974582246</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">H35 2016</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.4/32</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Halton, Wolf,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008027672</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux 2 /</subfield><subfield code="c">Wolf Halton, Bo Weaver.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a professional ethical hacker who is looking to expand their offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge of Linux operating systems and the Bash terminal emulator as well as Windows OS and command line, would be highly beneficial. What You Will LearnSet up Kali Linux for pentestingMap and enumerate your Windows networkExploit several common Windows network vulnerabilitiesAttack and defeat password schemes on WindowsDebug and reverse-engineer Windows programsRecover lost files, investigate successful hacks and discover hidden data in innocent-looking filesCatch and hold admin rights on the network, and maintain backdoors into the network after your initial testing is doneIn DetailKali Linux is the premier platform for testing and maintaining Windows security. This book lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities, in order to be able to exploit a system remotely. After this, you will perform web access exploits using tools such as websploit and others. Security is only as strong as the weakest link in the chain, and passwords are often that weak link. So, you will learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you get to grips with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. So, you will not only learn to penetrate the machine, but you will also learn about privilege escalations in Windows. You will also be able to quickly pentest your system and network.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Weaver, Bo,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Halton, Wolf.</subfield><subfield code="t">Kali Linux 2: Windows Penetration Testing.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2016</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261891</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4594301</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1261891</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn974582246 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:27:41Z |
institution | BVB |
isbn | 1782168508 9781782168508 |
language | English |
oclc_num | 974582246 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Halton, Wolf, author. http://id.loc.gov/authorities/names/no2008027672 Kali Linux 2 / Wolf Halton, Bo Weaver. Birmingham, UK : Packt Publishing, 2016. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Includes index. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a professional ethical hacker who is looking to expand their offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge of Linux operating systems and the Bash terminal emulator as well as Windows OS and command line, would be highly beneficial. What You Will LearnSet up Kali Linux for pentestingMap and enumerate your Windows networkExploit several common Windows network vulnerabilitiesAttack and defeat password schemes on WindowsDebug and reverse-engineer Windows programsRecover lost files, investigate successful hacks and discover hidden data in innocent-looking filesCatch and hold admin rights on the network, and maintain backdoors into the network after your initial testing is doneIn DetailKali Linux is the premier platform for testing and maintaining Windows security. This book lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities, in order to be able to exploit a system remotely. After this, you will perform web access exploits using tools such as websploit and others. Security is only as strong as the weakest link in the chain, and passwords are often that weak link. So, you will learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you get to grips with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. So, you will not only learn to penetrate the machine, but you will also learn about privilege escalations in Windows. You will also be able to quickly pentest your system and network. Print version record. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast Weaver, Bo, author. Print version: Halton, Wolf. Kali Linux 2: Windows Penetration Testing. Birmingham : Packt Publishing, ©2016 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261891 Volltext |
spellingShingle | Halton, Wolf Weaver, Bo Kali Linux 2 / Community experience distilled. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85029553 https://id.nlm.nih.gov/mesh/D016494 |
title | Kali Linux 2 / |
title_auth | Kali Linux 2 / |
title_exact_search | Kali Linux 2 / |
title_full | Kali Linux 2 / Wolf Halton, Bo Weaver. |
title_fullStr | Kali Linux 2 / Wolf Halton, Bo Weaver. |
title_full_unstemmed | Kali Linux 2 / Wolf Halton, Bo Weaver. |
title_short | Kali Linux 2 / |
title_sort | kali linux 2 |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Security General. bisacsh Computer security fast Computers Access control fast |
topic_facet | Kali Linux. Kali Linux Computer security. Computers Access control. Computer Security Sécurité informatique. Ordinateurs Accès Contrôle. COMPUTERS Security General. Computer security Computers Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261891 |
work_keys_str_mv | AT haltonwolf kalilinux2 AT weaverbo kalilinux2 |