Kali Linux Cookbook - Second Edition.:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2016.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | How to do it ... |
Beschreibung: | 1 online resource (430 pages) |
ISBN: | 1784394254 9781784394257 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1004201785 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 170916s2016 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d MERUC |d IDB |d NLE |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d IDEBK |d YDX |d OCLCQ |d LVT |d N$T |d OCLCQ |d OCLCO |d LOY |d UKAHL |d K6U |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1004363940 |a 1004545117 |a 1051032781 | ||
020 | |a 1784394254 | ||
020 | |a 9781784394257 |q (electronic bk.) | ||
020 | |z 1784390305 | ||
035 | |a (OCoLC)1004201785 |z (OCoLC)1004363940 |z (OCoLC)1004545117 |z (OCoLC)1051032781 | ||
037 | |a 1036129 |b MIL | ||
050 | 4 | |a QA76.9.A25 |b .S385 2017eb | |
082 | 7 | |a 005.8 | |
049 | |a MAIN | ||
100 | 1 | |a Schultz, Corey, |e author. | |
245 | 1 | 0 | |a Kali Linux Cookbook - Second Edition. |
250 | |a 2nd ed. | ||
260 | |a Birmingham : |b Packt Publishing, |c 2016. | ||
300 | |a 1 online resource (430 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more. | |
505 | 8 | |a Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ... | |
505 | 8 | |a Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready. | |
505 | 8 | |a How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction. | |
505 | 8 | |a Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready. | |
500 | |a How to do it ... | ||
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Tests d'intrusion. | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
700 | 1 | |a Perciaccante, Bob, |e author. | |
758 | |i has work: |a Kali Linux Cookbook - Second Edition (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXWqc8pP7FvG9k7rMgbF6q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Schultz, Corey P. |t Kali Linux Cookbook - Second Edition. |d Birmingham : Packt Publishing, ©2016 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH30656360 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5046633 | ||
938 | |a EBSCOhost |b EBSC |n 1621701 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34518235 | ||
938 | |a YBP Library Services |b YANK |n 14807798 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1004201785 |
---|---|
_version_ | 1816882400366428160 |
adam_text | |
any_adam_object | |
author | Schultz, Corey Perciaccante, Bob |
author_facet | Schultz, Corey Perciaccante, Bob |
author_role | aut aut |
author_sort | Schultz, Corey |
author_variant | c s cs b p bp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 .S385 2017eb |
callnumber-search | QA76.9.A25 .S385 2017eb |
callnumber-sort | QA 276.9 A25 S385 42017EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more. Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ... Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready. How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction. Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready. |
ctrlnum | (OCoLC)1004201785 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06091cam a2200721Mu 4500</leader><controlfield tag="001">ZDB-4-EBA-on1004201785</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">170916s2016 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDB</subfield><subfield code="d">NLE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LOY</subfield><subfield code="d">UKAHL</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1004363940</subfield><subfield code="a">1004545117</subfield><subfield code="a">1051032781</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1784394254</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784394257</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1784390305</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1004201785</subfield><subfield code="z">(OCoLC)1004363940</subfield><subfield code="z">(OCoLC)1004545117</subfield><subfield code="z">(OCoLC)1051032781</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">1036129</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.S385 2017eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schultz, Corey,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux Cookbook - Second Edition.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (430 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ...</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How to do it ...</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perciaccante, Bob,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Kali Linux Cookbook - Second Edition (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXWqc8pP7FvG9k7rMgbF6q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Schultz, Corey P.</subfield><subfield code="t">Kali Linux Cookbook - Second Edition.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2016</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30656360</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5046633</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1621701</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis34518235</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14807798</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1004201785 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:01Z |
institution | BVB |
isbn | 1784394254 9781784394257 |
language | English |
oclc_num | 1004201785 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (430 pages) |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Schultz, Corey, author. Kali Linux Cookbook - Second Edition. 2nd ed. Birmingham : Packt Publishing, 2016. 1 online resource (430 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more. Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ... Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready. How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction. Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready. How to do it ... Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Tests d'intrusion. Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast Penetration testing (Computer security) fast Perciaccante, Bob, author. has work: Kali Linux Cookbook - Second Edition (Text) https://id.oclc.org/worldcat/entity/E39PCXWqc8pP7FvG9k7rMgbF6q https://id.oclc.org/worldcat/ontology/hasWork Print version: Schultz, Corey P. Kali Linux Cookbook - Second Edition. Birmingham : Packt Publishing, ©2016 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701 Volltext |
spellingShingle | Schultz, Corey Perciaccante, Bob Kali Linux Cookbook - Second Edition. Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more. Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ... Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready. How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction. Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Tests d'intrusion. Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85035859 http://id.loc.gov/authorities/subjects/sh2011003137 |
title | Kali Linux Cookbook - Second Edition. |
title_auth | Kali Linux Cookbook - Second Edition. |
title_exact_search | Kali Linux Cookbook - Second Edition. |
title_full | Kali Linux Cookbook - Second Edition. |
title_fullStr | Kali Linux Cookbook - Second Edition. |
title_full_unstemmed | Kali Linux Cookbook - Second Edition. |
title_short | Kali Linux Cookbook - Second Edition. |
title_sort | kali linux cookbook second edition |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Tests d'intrusion. Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast Penetration testing (Computer security) fast |
topic_facet | Kali Linux. Kali Linux Information technology Security measures. Computer security Management. Computer networks Security measures. Data protection. Penetration testing (Computer security) Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) Tests d'intrusion. Computer networks Security measures Computer security Management Data protection Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701 |
work_keys_str_mv | AT schultzcorey kalilinuxcookbooksecondedition AT perciaccantebob kalilinuxcookbooksecondedition |