Cargando…

Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.

Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distributi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D.
Otros Autores: Oriyano, Sean-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBSCO_on1089595945
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 190309s2019 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d CHVBK  |d OCLCO  |d MERUC  |d OCLCF  |d OCLCQ  |d VT2  |d OCLCQ  |d N$T  |d NLW  |d OCLCO  |d UKMGB  |d OCLCQ  |d OCLCO 
015 |a GBC216909  |2 bnb 
016 7 |a 019299039  |2 Uk 
020 |a 1788996682 
020 |a 9781788996686  |q (electronic bk.) 
020 |z 9781788995177  |q print 
029 1 |a AU@  |b 000065126673 
029 1 |a CHNEW  |b 001040588 
029 1 |a CHVBK  |b 559029519 
029 1 |a UKMGB  |b 019299039 
029 1 |a AU@  |b 000068989289 
035 |a (OCoLC)1089595945 
037 |a 9781788996686  |b Packt Publishing 
050 4 |a QA76.9.A25  |b .S564 2019 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Singh, Glen D. 
245 1 0 |a Hands-On Penetration Testing with Kali NetHunter :  |b Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2019. 
300 |a 1 online resource (289 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel 
505 8 |a The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team 
505 8 |a Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering 
505 8 |a Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng 
505 8 |a Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning 
500 |a Full Open/TCP connect scans 
520 |a Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment. 
504 |a Includes bibliographical references. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computer networking & communications.  |2 bicssc 
650 7 |a Operating systems.  |2 bicssc 
650 7 |a Computers  |x Networking  |x General.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Operating Systems  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Oriyano, Sean-Philip. 
776 0 8 |i Print version:  |a Singh, Glen D.  |t Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.  |d Birmingham : Packt Publishing Ltd, ©2019  |z 9781788995177 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5721786 
938 |a EBSCOhost  |b EBSC  |n 2037546 
994 |a 92  |b IZTAP