The ultimate Kali Linux book: perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same wa...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2022
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781837632473/?ar |
Zusammenfassung: | Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment In Detail Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Audience This pentesting audiobook is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) |
Umfang: | 1 Online-Ressource (1 audio file (13 hr., 47 min.)) |
ISBN: | 9781837632473 1837632472 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-083658467 | ||
003 | DE-627-1 | ||
005 | 20240228121855.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230111s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781837632473 |c electronic audio bk. |9 978-1-83763-247-3 | ||
020 | |a 1837632472 |c electronic audio bk. |9 1-83763-247-2 | ||
035 | |a (DE-627-1)083658467 | ||
035 | |a (DE-599)KEP083658467 | ||
035 | |a (ORHE)9781837632473 | ||
035 | |a (DE-627-1)083658467 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20221213 | |
100 | 1 | |a Singh, Glen D. |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The ultimate Kali Linux book |b perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire |c Glen D. Singh |
250 | |a Second edition. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2022 | |
300 | |a 1 Online-Ressource (1 audio file (13 hr., 47 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) | ||
520 | |a Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment In Detail Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Audience This pentesting audiobook is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you. | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Hackers | |
650 | 0 | |a Operating systems (Computers) | |
650 | 4 | |a Kali Linux | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a operating systems | |
650 | 4 | |a Hackers | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Freeman, Alex |e ErzählerIn |4 nrt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781837632473/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-083658467 |
---|---|
_version_ | 1821494816423280640 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. |
author2 | Freeman, Alex |
author2_role | nrt |
author2_variant | a f af |
author_facet | Singh, Glen D. Freeman, Alex |
author_role | aut |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)083658467 (DE-599)KEP083658467 (ORHE)9781837632473 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04085cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-083658467</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121855.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837632473</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-83763-247-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837632472</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-83763-247-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP083658467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837632473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083658467</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The ultimate Kali Linux book</subfield><subfield code="b">perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire</subfield><subfield code="c">Glen D. Singh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 audio file (13 hr., 47 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed December 13, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment In Detail Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Audience This pentesting audiobook is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Freeman, Alex</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837632473/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-083658467 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:23Z |
institution | BVB |
isbn | 9781837632473 1837632472 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 audio file (13 hr., 47 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Singh, Glen D. VerfasserIn aut The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh Second edition. [Place of publication not identified] Packt Publishing 2022 1 Online-Ressource (1 audio file (13 hr., 47 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed December 13, 2022) Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment In Detail Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Audience This pentesting audiobook is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you. Kali Linux Penetration testing (Computer security) Hackers Operating systems (Computers) Tests d'intrusion Pirates informatiques Systèmes d'exploitation (Ordinateurs) operating systems Audiobooks Livres audio Freeman, Alex ErzählerIn nrt |
spellingShingle | Singh, Glen D. The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Kali Linux Penetration testing (Computer security) Hackers Operating systems (Computers) Tests d'intrusion Pirates informatiques Systèmes d'exploitation (Ordinateurs) operating systems Audiobooks Livres audio |
title | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire |
title_auth | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire |
title_exact_search | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire |
title_full | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh |
title_fullStr | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh |
title_full_unstemmed | The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh |
title_short | The ultimate Kali Linux book |
title_sort | ultimate kali linux book perform advanced penetration testing using nmap metasploit aircrack ng and empire |
title_sub | perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire |
topic | Kali Linux Penetration testing (Computer security) Hackers Operating systems (Computers) Tests d'intrusion Pirates informatiques Systèmes d'exploitation (Ordinateurs) operating systems Audiobooks Livres audio |
topic_facet | Kali Linux Penetration testing (Computer security) Hackers Operating systems (Computers) Tests d'intrusion Pirates informatiques Systèmes d'exploitation (Ordinateurs) operating systems Audiobooks Livres audio |
work_keys_str_mv | AT singhglend theultimatekalilinuxbookperformadvancedpenetrationtestingusingnmapmetasploitaircrackngandempire AT freemanalex theultimatekalilinuxbookperformadvancedpenetrationtestingusingnmapmetasploitaircrackngandempire AT singhglend ultimatekalilinuxbookperformadvancedpenetrationtestingusingnmapmetasploitaircrackngandempire AT freemanalex ultimatekalilinuxbookperformadvancedpenetrationtestingusingnmapmetasploitaircrackngandempire |