万本电子书0元读

万本电子书0元读

顶部广告

Instant Kali Linux电子书

售       价:¥

22人正在读 | 0人评论 9.8

作       者:Abhinav Singh

出  版  社:Packt Publishing

出版时间:2013-10-25

字       数:74.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:此类商品不支持退换货,不支持下载打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical language which requires only a basic knowledge of security assessments and the Linux operating system.
目录展开

Instant Kali Linux

Instant Kali Linux

Credits

About the Author

About the Reviewers

www.packtpub.com

Support files, eBooks, discount offers, and more

packtlib.packtpub.com

Why subscribe?

Free access for Packt account holders

1. Instant Kali Linux

So, what is Kali Linux?

Installation

Step 1 – download and boot

Step 2 – setting the dual boot

Step 3 – beginning with the installation

Installing Kali as a virtual machine

Updating Kali Linux

And that's it

Quick start – getting your tools right

Understanding the memory layout

Information gathering and sniffing with Kali Linux

DNSmap analysis

Network scanners

Detecting live hosts

SSL analysis

Network sniffing

Working with vulnerability assessment tools

Web app penetration testing in Kali

WebScarab proxy

Attacking the database using sqlninja

The Websploit framework

Breaking passwords

John the Ripper

Working with RainbowCrack

Targeting wireless networks

Working with Kismet

Fern WIFI Cracker

Bluetooth auditing

BlueRanger

Exploitation frameworks and tools

Browser Exploitation Framework

Social Engineer Toolkit

Working with forensics tools

Autopsy Forensic Browser

The Sleuth Kit

Top 5 features you need to know about

Information gathering with Nmap

Breaking wireless passwords using Aircrack

Web app penetration testing with Burp Suite

Burp proxy

Burp Spider

Burp Intruder

Metasploit Exploitation Framework

Features of Metasploit

Network forensics using Kali Linux

Network analysis with Wireshark

Rootkit-scanning forensics with chkrootkit

File analysis using md5deep

People and places you should get to know

Official sites

Articles and tutorials

Community

Blogs

Twitter

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部