nexusstc/Kali Linux 2 Assuring Security by Penetration Testing/d4ff73912cb70eb257eb031eebbcf56c.epub
Kali Linux 2 assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition 🔍
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
Packt Publishing - ebooks Account, 3rd Revised edition, 2016-09-22
英语 [en] · EPUB · 45.3MB · 2016 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!
About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town―Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Who This Book Is For If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.
What You Will Learn Find out to download and install your own copy of Kali Linux Properly scope and conduct the initial stages of a penetration test Conduct reconnaissance and enumeration of target networks Exploit and gain a foothold on a target system or network Obtain and crack passwords Use the Kali Linux NetHunter install to conduct wireless penetration testing Create proper penetration testing reports In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.
Style and approach This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.
About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town―Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Who This Book Is For If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.
What You Will Learn Find out to download and install your own copy of Kali Linux Properly scope and conduct the initial stages of a penetration test Conduct reconnaissance and enumeration of target networks Exploit and gain a foothold on a target system or network Obtain and crack passwords Use the Kali Linux NetHunter install to conduct wireless penetration testing Create proper penetration testing reports In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.
Style and approach This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.
备用文件名
lgli/Packt.Kali.Linux.2.Assuring.Security.by.Penetration.Testing.3rd.Edition.1785888420.epub
备用文件名
lgrsnf/Packt.Kali.Linux.2.Assuring.Security.by.Penetration.Testing.3rd.Edition.1785888420.epub
备用文件名
zlib/Computers/Networking/Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali/Kali Linux 2 Assuring Security by Penetration Testing_3369185.epub
备选作者
Gerard Johansen; Tedi Heriyanto; Lee Allen, (Information security specialist); Shakeel Ali
备选作者
Gerard Johansen; Shakeel Ali; Lee Allen, (Information security specialist); Tedi Heriyanto
备选作者
Johansen, Gerard, Allen, Lee, Heriyanto, Tedi, Ali, Shakeel
备用出版商
Packt Publishing Limited
备用版本
Community experience distilled, Third edition (Online-Ausg.), Birmingham, UK, 2016
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Packt Publishing, Birmingham, UK, 2016
备用版本
Sep 22, 2016
元数据中的注释
0
元数据中的注释
lg2127469
元数据中的注释
{"edition":"3rd, revised","isbns":["1785888420","9781785888427"],"last_page":575,"publisher":"Packt Publishing"}
备用描述
About This BookGet a rock-solid insight into penetration testing techniques and test your corporate network against threats like never beforeFormulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town―Kali Linux 2 (aka Sana).Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smootherWho This Book Is ForIf you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.What You Will LearnFind out how to download and install your own copy of Kali LinuxProperly scope and conduct the initial stages of a penetration testConduct reconnaissance and enumeration of target networksExploit and gain a foothold on a target system or networkObtain and crack passwordsUse the Kali Linux NetHunter installation to conduct wireless penetration testingCreate proper penetration testing reportsIn DetailKali Linux 2 (also known as Sana) is considered the most significant release of Kali since 2013. You can use it to practice reconnaissance, social engineering, exploitation, and maintain access to your target. You can also document and report verified test results and perform a complete Kali Linux testing methodology.In the third edition of this book, we focus on the use of Kali Linux 2, a free Linux distribution that contains a number of tools related to penetration testing. This book will provide you with the skills needed so you can conduct penetration testing effectively. We'll start by showing you how to install Kali Linux, then walk you through the steps of using Kali Linux to penetration test, and finally guide you through proper reporting.
开源日期
2017-10-14
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.