Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Kali Linux for ethical hacking = penetration testing and vulnerability assessment for network security /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Kali Linux for ethical hacking / Mohamed Atef.
Reminder of title:
penetration testing and vulnerability assessment for network security /
Author:
Atef, Mohamed.
Description:
1 online resource (231 pages)
Subject:
COMPUTERS / Operating Systems / Linux. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000642.html
ISBN:
9789355517043
Kali Linux for ethical hacking = penetration testing and vulnerability assessment for network security /
Atef, Mohamed.
Kali Linux for ethical hacking
penetration testing and vulnerability assessment for network security /[electronic resource] :Mohamed Atef. - 1 online resource (231 pages)
Includes bibliographical references and index.
Kali Linux for ethical hacking : penetration testing and vulnerability assessment for network security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Foundations of Ethical Hacking and Kali Linux -- Chapter 2: Information Gathering and Network Scanning -- Chapter 3: Executing Vulnerability Assessment -- Chapter 4: Exploitation Techniques -- Chapter 5: Post-Exploitation Activities -- Chapter 6: Wireless Network Security and Exploitation -- Chapter 7: Web Application Attacks -- Chapter 8: Hands-on Shell Scripting with Error Debugging Automation -- Chapter 9: Real-World Penetration Testing Scenarios -- Index.
Access restricted to authorized users and institutions.
This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, explaining the installation and setup of Kali Linux, and progresses to advanced topics such as network scanning, vulnerability assessment, and exploitation techniques. Readers will learn information gathering with OSINT and Nmap to map networks. Understand vulnerability assessment using Nessus, OpenVAS, and Metasploit for exploitation and privilege escalation. Learn persistence methods and data exfiltration. Explore wireless network security with Aircrack-ng and best practices for Wi-Fi security. Identify web vulnerabilities using Burp Suite. Automate tasks with Bash scripting, and tackle real-world penetration testing scenarios, including red team vs blue team exercises. By the end, readers will have a solid understanding of penetration testing methodologies and be prepared to tackle real-world security challenges.
Mode of access: World Wide Web.
ISBN: 9789355517043Subjects--Topical Terms:
1483840
COMPUTERS / Operating Systems / Linux.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Kali Linux for ethical hacking = penetration testing and vulnerability assessment for network security /
LDR
:02688nam a2200289 i 4500
001
1157331
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355517043
020
$a
9789355517593
035
$a
BPB0000642
041
0 #
$a
eng
050
0 0
$a
TK5105.59
082
0 0
$a
005.8
100
1
$a
Atef, Mohamed.
$3
1072657
245
1 0
$a
Kali Linux for ethical hacking
$b
penetration testing and vulnerability assessment for network security /
$c
Mohamed Atef.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (231 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Kali Linux for ethical hacking : penetration testing and vulnerability assessment for network security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Foundations of Ethical Hacking and Kali Linux -- Chapter 2: Information Gathering and Network Scanning -- Chapter 3: Executing Vulnerability Assessment -- Chapter 4: Exploitation Techniques -- Chapter 5: Post-Exploitation Activities -- Chapter 6: Wireless Network Security and Exploitation -- Chapter 7: Web Application Attacks -- Chapter 8: Hands-on Shell Scripting with Error Debugging Automation -- Chapter 9: Real-World Penetration Testing Scenarios -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, explaining the installation and setup of Kali Linux, and progresses to advanced topics such as network scanning, vulnerability assessment, and exploitation techniques. Readers will learn information gathering with OSINT and Nmap to map networks. Understand vulnerability assessment using Nessus, OpenVAS, and Metasploit for exploitation and privilege escalation. Learn persistence methods and data exfiltration. Explore wireless network security with Aircrack-ng and best practices for Wi-Fi security. Identify web vulnerabilities using Burp Suite. Automate tasks with Bash scripting, and tackle real-world penetration testing scenarios, including red team vs blue team exercises. By the end, readers will have a solid understanding of penetration testing methodologies and be prepared to tackle real-world security challenges.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Operating Systems / Linux.
$2
bisacsh
$3
1483840
650
# 7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
655
# 4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000642.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login