|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_on1089595945 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190309s2019 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d CHVBK
|d OCLCO
|d MERUC
|d OCLCF
|d OCLCQ
|d VT2
|d OCLCQ
|d N$T
|d NLW
|d OCLCO
|d UKMGB
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC216909
|2 bnb
|
016 |
7 |
|
|a 019299039
|2 Uk
|
020 |
|
|
|a 1788996682
|
020 |
|
|
|a 9781788996686
|q (electronic bk.)
|
020 |
|
|
|z 9781788995177
|q print
|
029 |
1 |
|
|a AU@
|b 000065126673
|
029 |
1 |
|
|a CHNEW
|b 001040588
|
029 |
1 |
|
|a CHVBK
|b 559029519
|
029 |
1 |
|
|a UKMGB
|b 019299039
|
029 |
1 |
|
|a AU@
|b 000068989289
|
035 |
|
|
|a (OCoLC)1089595945
|
037 |
|
|
|a 9781788996686
|b Packt Publishing
|
050 |
|
4 |
|a QA76.9.A25
|b .S564 2019
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Glen D.
|
245 |
1 |
0 |
|a Hands-On Penetration Testing with Kali NetHunter :
|b Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2019.
|
300 |
|
|
|a 1 online resource (289 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel
|
505 |
8 |
|
|a The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team
|
505 |
8 |
|
|a Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering
|
505 |
8 |
|
|a Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng
|
505 |
8 |
|
|a Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning
|
500 |
|
|
|a Full Open/TCP connect scans
|
520 |
|
|
|a Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computer networking & communications.
|2 bicssc
|
650 |
|
7 |
|a Operating systems.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Networking
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Operating Systems
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
700 |
1 |
|
|a Oriyano, Sean-Philip.
|
776 |
0 |
8 |
|i Print version:
|a Singh, Glen D.
|t Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.
|d Birmingham : Packt Publishing Ltd, ©2019
|z 9781788995177
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5721786
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2037546
|
994 |
|
|
|a 92
|b IZTAP
|