Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
2019
|
Ausgabe: | Second edition |
Schlagwörter: | |
Links: | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2094781 |
Abstract: | Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. What you will learn Learn how to install, set up and customize Kali for pentesting on multiple platforms Pentest routers and embedded devices Get insights into fiddling around with software-defined radio Pwn and escalate through a corporate network Write good quality security reports Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed |
Beschreibung: | Previous edition published: 2017. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 15, 2019) |
Umfang: | 1 Online-Ressource Illustrationen |
ISBN: | 9781789953701 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV046708111 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200506s2019 xx a||| o|||| 00||| eng d | ||
020 | |a 9781789953701 |9 978-1-78995-370-1 | ||
035 | |a (OCoLC)1154003606 | ||
035 | |a (DE-599)BVBBV046708111 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Sharma, Himanshu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux, an ethical hacker's cookbook |b practical recipes that combine strategies, attacks, and tools for advanced penetration testing |c Himanshu Sharma |
250 | |a Second edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c 2019 | |
300 | |a 1 Online-Ressource |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Previous edition published: 2017. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 15, 2019) | ||
520 | 3 | |a Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. | |
520 | 3 | |a You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. | |
520 | 3 | |a What you will learn Learn how to install, set up and customize Kali for pentesting on multiple platforms Pentest routers and embedded devices Get insights into fiddling around with software-defined radio Pwn and escalate through a corporate network Write good quality security reports Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed | |
653 | 0 | |a Kali Linux | |
653 | 0 | |a Penetration testing (Computer security) | |
653 | 0 | |a Computer security | |
653 | 0 | |a Computers ; Access control | |
653 | 0 | |a Computer networks ; Security measures | |
653 | 0 | |a Electronic books | |
653 | 0 | |a Electronic books ; local | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-78995-370-7 |
912 | |a ZDB-4-NLEBK | ||
912 | |a ZDB-5-WPSE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032118550 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2094781 |l DE-706 |p ZDB-4-NLEBK |q UBY01_DDA20 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818986939399798784 |
---|---|
any_adam_object | |
author | Sharma, Himanshu |
author_facet | Sharma, Himanshu |
author_role | aut |
author_sort | Sharma, Himanshu |
author_variant | h s hs |
building | Verbundindex |
bvnumber | BV046708111 |
collection | ZDB-4-NLEBK ZDB-5-WPSE |
ctrlnum | (OCoLC)1154003606 (DE-599)BVBBV046708111 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03976nam a22004451c 4500</leader><controlfield tag="001">BV046708111</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200506s2019 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789953701</subfield><subfield code="9">978-1-78995-370-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1154003606</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046708111</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharma, Himanshu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux, an ethical hacker's cookbook</subfield><subfield code="b">practical recipes that combine strategies, attacks, and tools for advanced penetration testing</subfield><subfield code="c">Himanshu Sharma</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2017. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 15, 2019)</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">What you will learn Learn how to install, set up and customize Kali for pentesting on multiple platforms Pentest routers and embedded devices Get insights into fiddling around with software-defined radio Pwn and escalate through a corporate network Write good quality security reports Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computers ; Access control</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books ; local</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-78995-370-7</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032118550</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2094781</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA20</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046708111 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:58:45Z |
institution | BVB |
isbn | 9781789953701 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032118550 |
oclc_num | 1154003606 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource Illustrationen |
psigel | ZDB-4-NLEBK ZDB-5-WPSE ZDB-4-NLEBK UBY01_DDA20 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt |
record_format | marc |
spelling | Sharma, Himanshu Verfasser aut Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma Second edition Birmingham ; Mumbai Packt 2019 1 Online-Ressource Illustrationen txt rdacontent c rdamedia cr rdacarrier Previous edition published: 2017. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 15, 2019) Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. What you will learn Learn how to install, set up and customize Kali for pentesting on multiple platforms Pentest routers and embedded devices Get insights into fiddling around with software-defined radio Pwn and escalate through a corporate network Write good quality security reports Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed Kali Linux Penetration testing (Computer security) Computer security Computers ; Access control Computer networks ; Security measures Electronic books Electronic books ; local Erscheint auch als Druck-Ausgabe 1-78995-370-7 |
spellingShingle | Sharma, Himanshu Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_auth | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_exact_search | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_full | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_fullStr | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_full_unstemmed | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_short | Kali Linux, an ethical hacker's cookbook |
title_sort | kali linux an ethical hacker s cookbook practical recipes that combine strategies attacks and tools for advanced penetration testing |
title_sub | practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
work_keys_str_mv | AT sharmahimanshu kalilinuxanethicalhackerscookbookpracticalrecipesthatcombinestrategiesattacksandtoolsforadvancedpenetrationtesting |