Schade – dieser Artikel ist leider ausverkauft. Sobald wir wissen, ob und wann der Artikel wieder verfügbar ist, informieren wir Sie an dieser Stelle.
  • Format: ePub

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kalis expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. Youll also explore the vulnerabilities that make those tests necessary.Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 18.54MB
  • FamilySharing(5)
Produktbeschreibung
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kalis expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. Youll also explore the vulnerabilities that make those tests necessary.Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. Youll discover different techniques for extending Kali tools and creating your own toolset.Learn tools for stress testing network stacks and applicationsPerform network reconnaissance to determine whats available to attackersExecute penetration tests using automated exploit tools such as MetasploitUse cracking tools to see if passwords meet complexity requirementsTest wireless capabilities by injecting frames and cracking passwordsAssess web application vulnerabilities with automated or proxy-based toolsCreate advanced attack techniques by extending Kali tools or developing your ownUse Kali Linux to generate reports once testing is complete

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Ric Messier is an author, consultant, and educator who holds GCIH, GSEC, CEH, and CISSP certifications, and has published several books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor. He is currently a Director for Cyber Academic Programs at Circadence and was formerly the Program Director for Cybersecurity and Digital Forensics at Champlain College.