|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1249475410 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210501s2021 inu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d YDX
|d N$T
|d OCLCO
|d YDX
|d OCLCF
|d UKMGB
|d YDXIT
|d UKAHL
|d TOH
|d OCLCQ
|d TEFOD
|d OCLCO
|d IEEEE
|d OCLCQ
|
015 |
|
|
|a GBC1D0230
|2 bnb
|
016 |
7 |
|
|a 020178697
|2 Uk
|
019 |
|
|
|a 1249090576
|a 1252912794
|
020 |
|
|
|a 9781119719076
|q (electronic book)
|
020 |
|
|
|a 1119719070
|q (electronic book)
|
020 |
|
|
|a 9781119719649
|q (electronic book)
|
020 |
|
|
|a 111971964X
|q (electronic book)
|
020 |
|
|
|a 9781394177431
|q (electronic bk.)
|
020 |
|
|
|a 1394177437
|q (electronic bk.)
|
020 |
|
|
|z 1119719089
|
020 |
|
|
|z 9781119719083
|
024 |
7 |
|
|a 10.1002/9781394177431
|2 doi
|
029 |
1 |
|
|a AU@
|b 000069696087
|
029 |
1 |
|
|a UKMGB
|b 020178697
|
035 |
|
|
|a (OCoLC)1249475410
|z (OCoLC)1249090576
|z (OCoLC)1252912794
|
037 |
|
|
|a 9781119719076
|b Wiley
|
037 |
|
|
|a 7FD4FD6B-05FF-4E68-9477-8D619B6DA13A
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9936690
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|b K43 2021
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Khawaja, Gus,
|e author.
|
245 |
1 |
0 |
|a Kali Linux Penetration Testing Bible /
|c Gus Khawaja.
|
264 |
|
1 |
|a Indianapolis, Indiana :
|b John Wiley & Sons, Inc.,
|c [2021]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editor -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- What Does This Book Cover? -- Companion Download Files -- How to Contact the Publisher -- How to Contact the Author -- Chapter 1 Mastering the Terminal Window -- Kali Linux File System -- Terminal Window Basic Commands -- Tmux Terminal Window -- Starting Tmux -- Tmux Key Bindings -- Tmux Session Management -- Navigating Inside Tmux -- Tmux Commands Reference -- Managing Users and Groups in Kali -- Users Commands -- Groups Commands
|
505 |
8 |
|
|a Managing Passwords in Kali -- Files and Folders Management in Kali Linux -- Displaying Files and Folders -- Permissions -- Manipulating Files in Kali -- Searching for Files -- Files Compression -- Manipulating Directories in Kali -- Mounting a Directory -- Managing Text Files in Kali Linux -- Vim vs. Nano -- Searching and Filtering Text -- Remote Connections in Kali -- Remote Desktop Protocol -- Secure Shell -- SSH with Credentials -- Passwordless SSH -- Kali Linux System Management -- Linux Host Information -- Linux OS Information -- Linux Hardware Information -- Managing Running Services
|
505 |
8 |
|
|a Package Management -- Process Management -- Networking in Kali Linux -- Network Interface -- IPv4 Private Address Ranges -- Static IP Addressing -- DNS -- Established Connections -- File Transfers -- Summary -- Chapter 2 Bash Scripting -- Basic Bash Scripting -- Printing to the Screen in Bash -- Variables -- Commands Variable -- Script Parameters -- User Input -- Functions -- Conditions and Loops -- Conditions -- Loops -- File Iteration -- Summary -- Chapter 3 Network Hosts Scanning -- Basics of Networking -- Networking Protocols -- TCP -- UDP -- Other Networking Protocols -- IP Addressing
|
505 |
8 |
|
|a IPv4 -- Subnets and CIDR -- IPv6 -- Port Numbers -- Network Scanning -- Identifying Live Hosts -- Ping -- ARP -- Nmap -- Port Scanning and Services Enumeration -- TCP Port SYN Scan -- UDP -- Basics of Using Nmap Scans -- Services Enumeration -- Operating System Fingerprinting -- Nmap Scripting Engine -- NSE Category Scan -- NSE Arguments -- DNS Enumeration -- DNS Brute-Force -- DNS Zone Transfer -- DNS Subdomains Tools -- Fierce -- Summary -- Chapter 4 Internet Information Gathering -- Passive Footprinting and Reconnaissance -- Internet Search Engines -- Shodan -- Google Queries
|
505 |
8 |
|
|a Information Gathering Using Kali Linux -- Whois Database -- TheHarvester -- DMitry -- Maltego -- Summary -- Chapter 5 Social Engineering Attacks -- Spear Phishing Attacks -- Sending an E-mail -- The Social Engineer Toolkit -- Sending an E-mail Using Python -- Stealing Credentials -- Payloads and Listeners -- Bind Shell vs. Reverse Shell -- Bind Shell -- Reverse Shell -- Reverse Shell Using SET -- Social Engineering with the USB Rubber Ducky -- A Practical Reverse Shell Using USB Rubber Ducky and PowerShell -- Generating a PowerShell Script -- Starting a Listener -- Hosting the PowerShell Script
|
500 |
|
|
|a Running PowerShell.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on August 16, 2021).
|
520 |
|
|
|a Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
776 |
0 |
8 |
|i Print version:
|a Khawaja, Gus.
|t Kali Linux Penetration Testing Bible.
|d Newark : John Wiley & Sons, Incorporated, ©2021
|z 9781119719083
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119719083/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38627432
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38579352
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6577242
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2918537
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302158982
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302101535
|
994 |
|
|
|a 92
|b IZTAP
|