9781492028697-149202869X-Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

ISBN-13: 9781492028697
ISBN-10: 149202869X
Edition: 1
Author: Ric Messier
Publication date: 2018
Publisher: O'Reilly Media
Format: Paperback 400 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $16.54 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $29.81 USD
Buy

From $29.81

Rent

From $16.54

Book details

ISBN-13: 9781492028697
ISBN-10: 149202869X
Edition: 1
Author: Ric Messier
Publication date: 2018
Publisher: O'Reilly Media
Format: Paperback 400 pages

Summary

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking (ISBN-13: 9781492028697 and ISBN-10: 149202869X), written by authors Ric Messier, was published by O'Reilly Media in 2018. With an overall rating of 3.8 stars, it's a notable title among other Linux (Hacking, Security & Encryption, Encryption, Cryptography, Operating Systems) books. You can easily purchase or rent Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking (Paperback) from BooksRun, along with many other new and used Linux books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $9.9.

Description

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.

  • Learn tools for stress testing network stacks and applications
  • Perform network reconnaissance to determine what’s available to attackers
  • Execute penetration tests using automated exploit tools such as Metasploit
  • Use cracking tools to see if passwords meet complexity requirements
  • Test wireless capabilities by injecting frames and cracking passwords
  • Assess web application vulnerabilities with automated or proxy-based tools
  • Create advanced attack techniques by extending Kali tools or developing your own
  • Use Kali Linux to generate reports once testing is complete


Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book