語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Kali Linux for ethical hacking : = penetration testing and vulnerability assessment for network security /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Kali Linux for ethical hacking :/ Mohamed Atef.
其他題名:
penetration testing and vulnerability assessment for network security /
作者:
Atef, Mohamed.
面頁冊數:
1 online resource (231 pages)
標題:
COMPUTERS / Operating Systems / Linux. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000642.html
ISBN:
9789355517043
Kali Linux for ethical hacking : = penetration testing and vulnerability assessment for network security /
Atef, Mohamed.
Kali Linux for ethical hacking :
penetration testing and vulnerability assessment for network security /Mohamed Atef. - 1 online resource (231 pages)
Includes bibliographical references and index.
Kali Linux for ethical hacking : penetration testing and vulnerability assessment for network security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Foundations of Ethical Hacking and Kali Linux -- Chapter 2: Information Gathering and Network Scanning -- Chapter 3: Executing Vulnerability Assessment -- Chapter 4: Exploitation Techniques -- Chapter 5: Post-Exploitation Activities -- Chapter 6: Wireless Network Security and Exploitation -- Chapter 7: Web Application Attacks -- Chapter 8: Hands-on Shell Scripting with Error Debugging Automation -- Chapter 9: Real-World Penetration Testing Scenarios -- Index.
Access restricted to authorized users and institutions.
This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, explaining the installation and setup of Kali Linux, and progresses to advanced topics such as network scanning, vulnerability assessment, and exploitation techniques. Readers will learn information gathering with OSINT and Nmap to map networks. Understand vulnerability assessment using Nessus, OpenVAS, and Metasploit for exploitation and privilege escalation. Learn persistence methods and data exfiltration. Explore wireless network security with Aircrack-ng and best practices for Wi-Fi security. Identify web vulnerabilities using Burp Suite. Automate tasks with Bash scripting, and tackle real-world penetration testing scenarios, including red team vs blue team exercises. By the end, readers will have a solid understanding of penetration testing methodologies and be prepared to tackle real-world security challenges.
Mode of access: World Wide Web.
ISBN: 9789355517043Subjects--Topical Terms:
1483840
COMPUTERS / Operating Systems / Linux.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Kali Linux for ethical hacking : = penetration testing and vulnerability assessment for network security /
LDR
:02662nam a2200289 i 4500
001
1157331
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355517043
020
$a
9789355517593
035
$a
BPB0000642
041
0
$a
eng
050
0 0
$a
TK5105.59
082
0 0
$a
005.8
100
1
$a
Atef, Mohamed.
$3
1072657
245
1 0
$a
Kali Linux for ethical hacking :
$b
penetration testing and vulnerability assessment for network security /
$c
Mohamed Atef.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (231 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Kali Linux for ethical hacking : penetration testing and vulnerability assessment for network security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Foundations of Ethical Hacking and Kali Linux -- Chapter 2: Information Gathering and Network Scanning -- Chapter 3: Executing Vulnerability Assessment -- Chapter 4: Exploitation Techniques -- Chapter 5: Post-Exploitation Activities -- Chapter 6: Wireless Network Security and Exploitation -- Chapter 7: Web Application Attacks -- Chapter 8: Hands-on Shell Scripting with Error Debugging Automation -- Chapter 9: Real-World Penetration Testing Scenarios -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, explaining the installation and setup of Kali Linux, and progresses to advanced topics such as network scanning, vulnerability assessment, and exploitation techniques. Readers will learn information gathering with OSINT and Nmap to map networks. Understand vulnerability assessment using Nessus, OpenVAS, and Metasploit for exploitation and privilege escalation. Learn persistence methods and data exfiltration. Explore wireless network security with Aircrack-ng and best practices for Wi-Fi security. Identify web vulnerabilities using Burp Suite. Automate tasks with Bash scripting, and tackle real-world penetration testing scenarios, including red team vs blue team exercises. By the end, readers will have a solid understanding of penetration testing methodologies and be prepared to tackle real-world security challenges.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Operating Systems / Linux.
$2
bisacsh
$3
1483840
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000642.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入