Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Ric Messier
- 出版商: O'Reilly
- 出版日期: 2018-08-14
- 售價: $1,650
- 貴賓價: 9.5 折 $1,568
- 語言: 英文
- 頁數: 402
- 裝訂: Paperback
- ISBN: 149202869X
- ISBN-13: 9781492028697
-
相關分類:
資訊安全、kali-linux、Linux、Penetration-test 滲透測試、駭客 Hack
-
相關翻譯:
Kali Linux 學習手冊 (Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking) (簡中版)
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$940$700 -
$505CUDA 並行程序設計 : GPU 編程指南 (CUDA Programming: A Developer's Guide to Parallel Computing with GPUs)
-
$780$616 -
$980$833 -
$880$695 -
$680$578 -
$3,800$3,610 -
$500$425 -
$480$374 -
$780$616 -
$1,100$1,045 -
$450$356 -
$560$437 -
$454黑客大曝光:工業控制系統安全 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions)
-
$1,470$1,397 -
$580$493 -
$540$459 -
$356黑客攻防工具實戰從新手到高手 (超值版)
-
$580$452 -
$690$538 -
$480$336 -
$239$227 -
$708$673 -
$1,000$790 -
$580$458
商品描述
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming for both experienced and aspiring security professionals alike. Which tools are most appropriate for conducting various security tests and penetration tests? This practical book covers Kali’s broad range of security capabilities, and helps you identify the tools you need to conduct a wide range of tests. You’ll also explore the vulnerabilities that make those tests necessary.
Author Ric Messier takes you through the foundations of Kali Linux, and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools, and creating your own toolset.
- Learn tools for stress testing network stacks and applications
- Perform network reconnaissance to determine what’s available to attackers
- Use scanners to identify technical vulnerabilities in the network
- Execute penetration tests using automated exploit tools such as Metasploit
- Use cracking tools to see if passwords meet complexity requirements
- Test wireless capabilities by injecting frames and cracking passwords
- Assess web application vulnerabilities with automated or proxy-based tools
- Create advanced attack techniques by extending Kali tools or developing your own
- Use Kali Linux to generate reports once testing is complete