Cargando…

Kali Linux 2 /

Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Halton, Wolf (Autor), Weaver, Bo (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn974582246
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 170304s2016 enk o 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d CHVBK  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCO  |d N$T  |d AGLDB  |d STF  |d BTN  |d AUW  |d INTCL  |d MHW  |d SNK  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 1782168508 
020 |a 9781782168508  |q (electronic bk.) 
029 1 |a CHNEW  |b 000949035 
029 1 |a CHVBK  |b 483152080 
029 1 |a AU@  |b 000067106397 
035 |a (OCoLC)974582246 
050 4 |a QA76.9.A25  |b H35 2016 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.4/32  |2 23 
049 |a UAMI 
100 1 |a Halton, Wolf,  |e author. 
245 1 0 |a Kali Linux 2 /  |c Wolf Halton, Bo Weaver. 
260 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
500 |a Includes index. 
520 |a Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a professional ethical hacker who is looking to expand their offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge of Linux operating systems and the Bash terminal emulator as well as Windows OS and command line, would be highly beneficial. What You Will LearnSet up Kali Linux for pentestingMap and enumerate your Windows networkExploit several common Windows network vulnerabilitiesAttack and defeat password schemes on WindowsDebug and reverse-engineer Windows programsRecover lost files, investigate successful hacks and discover hidden data in innocent-looking filesCatch and hold admin rights on the network, and maintain backdoors into the network after your initial testing is doneIn DetailKali Linux is the premier platform for testing and maintaining Windows security. This book lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities, in order to be able to exploit a system remotely. After this, you will perform web access exploits using tools such as websploit and others. Security is only as strong as the weakest link in the chain, and passwords are often that weak link. So, you will learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you get to grips with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. So, you will not only learn to penetrate the machine, but you will also learn about privilege escalations in Windows. You will also be able to quickly pentest your system and network. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Weaver, Bo,  |e author. 
776 0 8 |i Print version:  |a Halton, Wolf.  |t Kali Linux 2: Windows Penetration Testing.  |d Birmingham : Packt Publishing, ©2016 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261891  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4594301 
938 |a EBSCOhost  |b EBSC  |n 1261891 
994 |a 92  |b IZTAP