Сообщение

Robert W. Beggs - Mastering Kali Linux for Advanced Penetration Testing [2014, PDF, ENG]

Сообщение Солнышко » 28 янв 2018, 17:03

Mastering Kali Linux for Advanced Penetration Testing
Год издания: 2014
Автор: Robert W. Beggs
Издательство: Packt Publishing
ISBN: 9781782163121
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 356
Описание: Book Description
Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network—directly attacking the end user.
This book will provide all the practical knowledge needed to test your network's security using a proven hacker's methodology.
What You Will Learn
- Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network
- Select and configure the most effective tools from Kali Linux to test network security
- Employ stealth to avoid detection in the network being tested
- Recognize when stealthy attacks are being used against your network
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network—the end users
Table of Contents
1: Starting with Kali Linux
2: Identifying the Target – Passive Reconnaissance
3: Active Reconnaissance and Vulnerability Scanning
4: Exploit
5: Post Exploit – Action on the Objective
6: Post Exploit – Persistence
7: Physical Attacks and Social Engineering
8: Exploiting Wireless Communications
9: Reconnaissance and Exploitation of Web-based Applications
10: Exploiting Remote Access Communications
11: Client-side Exploitation

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 28 янв 2018, 17:03
Размер: 8.96 МБ
Размер: 9 392 527 байт
Сидеров: 9
Личеров: 3
Скачали: 0
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 5 месяцев 12 дней 4 часа 12 минут 39 секунд назад
Последний личер: 5 месяцев 12 дней 4 часа 12 минут 39 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 3.3 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность