Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
- Autorzy:
- Lee Allen, Shakeel Ali, Tedi Heriyanto
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 454
- Dostępne formaty:
-
PDFePubMobi
Opis ebooka: Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
Wybrane bestsellery
-
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia pr...(107.40 zł najniższa cena z 30 dni)
125.30 zł
179.00 zł(-30%) -
Oto kompleksowe omówienie sposobów wdrażania najnowszych dostępnych środków zabezpieczających systemy linuksowe. Z książki dowiesz się, jak skonfigurować laboratorium do ćwiczeń praktycznych, tworzyć konta użytkowników z odpowiednimi poziomami uprawnień, chronić dane dzięki uprawnieniom i szyfrow...
Bezpieczeństwo systemu Linux. Hardening i najnowsze techniki zabezpieczania przed cyberatakami. Wydanie III Bezpieczeństwo systemu Linux. Hardening i najnowsze techniki zabezpieczania przed cyberatakami. Wydanie III
(77.40 zł najniższa cena z 30 dni)90.30 zł
129.00 zł(-30%) -
Autor znanych czytelnikom wydawnictwa Helion książek między innymi na temat otwartoźródłowego systemu operacyjnego przygotował szóstą już edycję przewodnika po komendach i poleceniach Linuksa. W kieszonkowym leksykonie omówił posługiwanie się komputerem z Linuksem na pokładzie za pomocą poleceń, ...(23.94 zł najniższa cena z 30 dni)
27.93 zł
39.90 zł(-30%) -
W sieci zabezpieczeń, które stworzyliśmy dla ochrony naszych danych, najsłabszym elementem jest zawsze czynnik ludzki. Hackerzy, zarówno etyczni, jak i nie, korzystają z wachlarza sztuczek opierających na „hackowaniu osobistym” i pozwalających przekonać innych do ujawnienia haseł, prz...
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
(35.40 zł najniższa cena z 30 dni)41.30 zł
59.00 zł(-30%) -
Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms.
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
In an era plagued by hacking and security breaches, this book navigates you through Kali Linux's latest version, adeptly addressing critical security dimensions. From confidentiality and integrity to availability and access control, empower yourself with efficient Kali Linux-based solutions.
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
With this new edition, get to grips with Linux kernel development on the long-term 6.1 (S)LTS kernel in a hands-on way with the help of brilliant code examples. Linux Kernel Programming 2E teaches you how to write high-quality kernel modules suitable for real-world products, following industry be...
Linux Kernel Programming. A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization - Second Edition Linux Kernel Programming. A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization - Second Edition
-
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Ta książka pomoże Ci w doskonaleniu umiejętności potrzebnych na każdym etapie dochodzenia cyfrowego, od zbierania dowodów, poprzez ich analizę, po tworzenie raportów. Dzięki wielu wskazówkom i praktycznym ćwiczeniom przyswoisz techniki analizy, ekstrakcji danych i raportowania przy użyciu zaawans...
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
(59.40 zł najniższa cena z 30 dni)69.30 zł
99.00 zł(-30%)
O autorach ebooka
Lee Allen, Shakeel Ali, Tedi Heriyanto - pozostałe książki
-
This book is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques. It offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a ...
Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition
Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto
-
This updated edition focuses on the use of Kali Linux 2, aka Sana, and provides you with the skills needed to conduct penetration testing effectively. You’ll find out how to install Kali Linux and then use it for pentesting with the help of cutting-edge wireless penetration tools, enabling...
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penet...
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply runni...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result i...
BackTrack 4: Assuring Security by Penetration Testing. Master the art of penetration testing with BackTrack BackTrack 4: Assuring Security by Penetration Testing. Master the art of penetration testing with BackTrack
Ebooka "Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- Tytuł oryginału:
- Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.
- ISBN Ebooka:
- 978-18-495-1949-6, 9781849519496
- Data wydania ebooka:
- 2014-04-07 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku Pdf:
- 7.8MB
- Rozmiar pliku ePub:
- 17.8MB
- Rozmiar pliku Mobi:
- 27.0MB
Spis treści ebooka
- Kali Linux Assuring Security by Penetration Testing
- Table of Contents
- Kali Linux Assuring Security by Penetration Testing
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Disclaimer
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- I. Lab Preparation and Testing Procedures
- 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Running Kali using Live DVD
- Installing on a hard disk
- Installing Kali on a physical machine
- Installing Kali on a virtual machine
- Installing Kali on a virtual machine from the ISO image
- Installing Kali in a virtual machine using the provided Kali VM image
- Installing Kali on a USB disk
- 1. Beginning with Kali Linux
- Configuring the virtual machine
- VirtualBox guest additions
- Setting up networking
- Setting up a wired connection
- Setting up a wireless connection
- Starting the network service
- Configuring shared folders
- Saving the guest machine state
- Exporting a virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- HTTP
- MySQL
- SSH
- Installing a vulnerable server
- Installing additional weapons
- Installing the Nessus vulnerability scanner
- Installing the Cisco password cracker
- Summary
- 2. Penetration Testing Methodology
- Types of penetration testing
- Black box testing
- White box testing
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- Open Source Security Testing Methodology Manual (OSSTMM)
- Key features and benefits
- Open Source Security Testing Methodology Manual (OSSTMM)
- Information Systems Security Assessment Framework (ISSAF)
- Key features and benefits
- Open Web Application Security Project (OWASP)
- Key features and benefits
- Web Application Security Consortium Threat Classification (WASC-TC)
- Key features and benefits
- Penetration Testing Execution Standard (PTES)
- Key features and benefits
- General penetration testing framework
- Target scoping
- Information gathering
- Target discovery
- Enumerating target
- Vulnerability mapping
- Social engineering
- Target exploitation
- Privilege escalation
- Maintaining access
- Documentation and reporting
- The ethics
- Summary
- II. Penetration Testers Armory
- 3. Target Scoping
- Gathering client requirements
- Creating the customer requirements form
- The deliverables assessment form
- Gathering client requirements
- Preparing the test plan
- The test plan checklist
- 3. Target Scoping
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- 4. Information Gathering
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- host
- dig
- dnsenum
- dnsdict6
- fierce
- DMitry
- Maltego
- Getting network routing information
- tcptraceroute
- tctrace
- Utilizing the search engine
- theharvester
- Metagoofil
- Summary
- 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- ping
- arping
- fping
- hping3
- nping
- alive6
- detect-new-ip6
- passive_discovery6
- nbtscan
- OS fingerprinting
- p0f
- Nmap
- Summary
- 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- Introducing port scanning
- The network scanner
- Nmap
- Nmap target specification
- Nmap TCP scan options
- Nmap UDP scan options
- Nmap port specification
- Nmap output options
- Nmap timing options
- Nmap useful options
- Service version detection
- Operating system detection
- Disabling host discovery
- Aggressive scan
- Nmap for scanning the IPv6 target
- The Nmap scripting engine
- Nmap options for Firewall/IDS evasion
- Nmap
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- onesixtyone
- snmpcheck
- VPN enumeration
- ike-scan
- Summary
- 7. Vulnerability Mapping
- Types of vulnerabilities
- Local vulnerability
- Remote vulnerability
- Types of vulnerabilities
- Vulnerability taxonomy
- Open Vulnerability Assessment System (OpenVAS)
- Tools used by OpenVAS
- Cisco analysis
- Cisco auditing tool
- Cisco global exploiter
- Fuzz analysis
- BED
- JBroFuzz
- SMB analysis
- Impacket Samrdump
- SNMP analysis
- SNMP Walk
- Web application analysis
- Database assessment tools
- DBPwAudit
- SQLMap
- SQL Ninja
- Database assessment tools
- Web application assessment
- Burp Suite
- Nikto2
- Paros proxy
- W3AF
- WafW00f
- WebScarab
- Summary
- 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Impersonation
- Reciprocation
- Influential authority
- Scarcity
- Social relationship
- Social Engineering Toolkit (SET)
- Targeted phishing attack
- Summary
- 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Scenario 1
- Scenario 2
- SNMP community scanner
- VNC blank authentication scanner
- IIS6 WebDAV unicode auth bypass
- Scenario 3
- Bind shell
- Reverse shell
- Meterpreter
- Scenario 4
- Generating a binary backdoor
- Automated browser exploitation
- Writing exploit modules
- Summary
- 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Offline attack tools
- hash-identifier
- Hashcat
- RainbowCrack
- samdump2
- John
- Johnny
- Ophcrack
- Crunch
- Offline attack tools
- Online attack tools
- CeWL
- Hydra
- Medusa
- Network spoofing tools
- DNSChef
- Setting up a DNS proxy
- Faking a domain
- DNSChef
- arpspoof
- Ettercap
- Network sniffers
- dsniff
- tcpdump
- Wireshark
- Summary
- 11. Maintaining Access
- Using operating system backdoors
- Cymothoa
- Intersect
- The meterpreter backdoor
- Using operating system backdoors
- Working with tunneling tools
- dns2tcp
- iodine
- Configuring the DNS server
- Running the iodine server
- Running the iodine client
- ncat
- proxychains
- ptunnel
- socat
- Getting HTTP header information
- Transferring files
- sslh
- stunnel4
- Creating web backdoors
- WeBaCoo
- weevely
- PHP meterpreter
- Summary
- 12. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- III. Extra Ammunition
- A. Supplementary Tools
- Reconnaissance tool
- Vulnerability scanner
- NeXpose Community Edition
- Installing NeXpose
- Starting the NeXpose community
- Logging in to the NeXpose community
- Using the NeXpose community
- NeXpose Community Edition
- Web application tools
- Golismero
- Arachni
- BlindElephant
- A. Supplementary Tools
- Network tool
- Netcat
- Open connection
- Service banner grabbing
- Simple chat server
- File transfer
- Portscanning
- Backdoor shell
- Reverse shell
- Netcat
- Summary
- B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Vulnerability disclosure and tracking
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index
Packt Publishing - inne książki
-
This book will guide you through the fundamental and advanced features of the Snowpark framework in Python. You’ll learn how to use Snowpark for implementing workloads in the fields of data engineering, data science, and data applications.
The Ultimate Guide to Snowpark. Design and deploy Snowpark with Python for efficient data workloads The Ultimate Guide to Snowpark. Design and deploy Snowpark with Python for efficient data workloads
-
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
(92.88 zł najniższa cena z 30 dni)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals Lee Allen, Shakeel Ali, Tedi Heriyanto (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.