Veze, linkovi
Kompjuter biblioteka
Korpa
Kali Linux 2 Assuring Security by Penetration Testing - Third Edition

Unix, Linux Unix, Linux

Kali Linux 2 Assuring Security by Penetration Testing - Third Edition

Autor: Gerard Johansen
Broj strana: 575
ISBN broj: 9781785888427
Izdavač: PACKT PUBLISHING PACKT PUBLISHING
Godina izdanja: 2016.

Pregleda (30 dana / ukupno): 17 / 1704

                 
Twitter   Facebook   Linkedin   Pinterest   Email
                 
Predlog za prevod

 

What You Will Learn

  • Find out to download and install your own copy of Kali Linux
  • Properly scope and conduct the initial stages of a penetration test
  • Conduct reconnaissance and enumeration of target networks
  • Exploit and gain a foothold on a target system or network
  • Obtain and crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports

Book Description

Kali Linux 2 (aka Sana) is considered as the most significant release of Kali since 2013. You can use it to practice reconnaissance, social engineering, exploitation, and maintain access to your target. You can also document and report verified test results as well as perform a complete Kali Linux testing methodology.

In the third edition of this book, we focus on the use of Kali Linux 2, a free Linux distribution that contains a number of tools related to penetration testing. This book will provide you with the skills needed so you can conduct penetration testing effectively. We’ll start by showing you how to install Kali Linux then walk you through the steps of using Kali Linux to penetration test, and finally guide you through proper reporting.

Authors

Gerard Johansen

Gerard Johansen is an information security professional who is currently employed by a consultancy servicing fortune 500 clients throughout North America. He has performed a number of functions including threat and risk assessments, incident response, vulnerability assessment and analysis, and penetration testing. He is a graduate of Norwich University’s Masters of Science in Information Assurance and holds the Certified Information Systems Security Professional certification.

Table of Contents

 

1: BEGINNING WITH KALI LINUX
2: PENETRATION TESTING METHODOLOGY
3: TARGET SCOPING
4: INFORMATION GATHERING
5: TARGET DISCOVERY
6: ENUMERATING TARGET
7: VULNERABILITY MAPPING
8: SOCIAL ENGINEERING
9: TARGET EXPLOITATION
10: PRIVILEGE ESCALATION
11: MAINTAINING ACCESS
12: DOCUMENTATION AND REPORTING

 

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

Kylix razvoj Linux aplikacija

Kylix razvoj Linux aplikacija

Prelazak na Linux: Zbogom Windowsu

Prelazak na Linux: Zbogom Windowsu

Veze, linkovi
Linkedin Twitter Facebook
 
     
 
© Sva prava pridržana, Kompjuter biblioteka, Beograd, Obalskih radnika 4a, Telefon: +381 11 252 0 272