Cargando…

Kali Linux Penetration Testing Bible /

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Khawaja, Gus (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley & Sons, Inc., [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1249475410
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 210501s2021 inu o 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d N$T  |d OCLCO  |d YDX  |d OCLCF  |d UKMGB  |d YDXIT  |d UKAHL  |d TOH  |d OCLCQ  |d TEFOD  |d OCLCO  |d IEEEE  |d OCLCQ 
015 |a GBC1D0230  |2 bnb 
016 7 |a 020178697  |2 Uk 
019 |a 1249090576  |a 1252912794 
020 |a 9781119719076  |q (electronic book) 
020 |a 1119719070  |q (electronic book) 
020 |a 9781119719649  |q (electronic book) 
020 |a 111971964X  |q (electronic book) 
020 |a 9781394177431  |q (electronic bk.) 
020 |a 1394177437  |q (electronic bk.) 
020 |z 1119719089 
020 |z 9781119719083 
024 7 |a 10.1002/9781394177431  |2 doi 
029 1 |a AU@  |b 000069696087 
029 1 |a UKMGB  |b 020178697 
035 |a (OCoLC)1249475410  |z (OCoLC)1249090576  |z (OCoLC)1252912794 
037 |a 9781119719076  |b Wiley 
037 |a 7FD4FD6B-05FF-4E68-9477-8D619B6DA13A  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9936690  |b IEEE 
050 4 |a QA76.9.A25  |b K43 2021 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Khawaja, Gus,  |e author. 
245 1 0 |a Kali Linux Penetration Testing Bible /  |c Gus Khawaja. 
264 1 |a Indianapolis, Indiana :  |b John Wiley & Sons, Inc.,  |c [2021] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editor -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- What Does This Book Cover? -- Companion Download Files -- How to Contact the Publisher -- How to Contact the Author -- Chapter 1 Mastering the Terminal Window -- Kali Linux File System -- Terminal Window Basic Commands -- Tmux Terminal Window -- Starting Tmux -- Tmux Key Bindings -- Tmux Session Management -- Navigating Inside Tmux -- Tmux Commands Reference -- Managing Users and Groups in Kali -- Users Commands -- Groups Commands 
505 8 |a Managing Passwords in Kali -- Files and Folders Management in Kali Linux -- Displaying Files and Folders -- Permissions -- Manipulating Files in Kali -- Searching for Files -- Files Compression -- Manipulating Directories in Kali -- Mounting a Directory -- Managing Text Files in Kali Linux -- Vim vs. Nano -- Searching and Filtering Text -- Remote Connections in Kali -- Remote Desktop Protocol -- Secure Shell -- SSH with Credentials -- Passwordless SSH -- Kali Linux System Management -- Linux Host Information -- Linux OS Information -- Linux Hardware Information -- Managing Running Services 
505 8 |a Package Management -- Process Management -- Networking in Kali Linux -- Network Interface -- IPv4 Private Address Ranges -- Static IP Addressing -- DNS -- Established Connections -- File Transfers -- Summary -- Chapter 2 Bash Scripting -- Basic Bash Scripting -- Printing to the Screen in Bash -- Variables -- Commands Variable -- Script Parameters -- User Input -- Functions -- Conditions and Loops -- Conditions -- Loops -- File Iteration -- Summary -- Chapter 3 Network Hosts Scanning -- Basics of Networking -- Networking Protocols -- TCP -- UDP -- Other Networking Protocols -- IP Addressing 
505 8 |a IPv4 -- Subnets and CIDR -- IPv6 -- Port Numbers -- Network Scanning -- Identifying Live Hosts -- Ping -- ARP -- Nmap -- Port Scanning and Services Enumeration -- TCP Port SYN Scan -- UDP -- Basics of Using Nmap Scans -- Services Enumeration -- Operating System Fingerprinting -- Nmap Scripting Engine -- NSE Category Scan -- NSE Arguments -- DNS Enumeration -- DNS Brute-Force -- DNS Zone Transfer -- DNS Subdomains Tools -- Fierce -- Summary -- Chapter 4 Internet Information Gathering -- Passive Footprinting and Reconnaissance -- Internet Search Engines -- Shodan -- Google Queries 
505 8 |a Information Gathering Using Kali Linux -- Whois Database -- TheHarvester -- DMitry -- Maltego -- Summary -- Chapter 5 Social Engineering Attacks -- Spear Phishing Attacks -- Sending an E-mail -- The Social Engineer Toolkit -- Sending an E-mail Using Python -- Stealing Credentials -- Payloads and Listeners -- Bind Shell vs. Reverse Shell -- Bind Shell -- Reverse Shell -- Reverse Shell Using SET -- Social Engineering with the USB Rubber Ducky -- A Practical Reverse Shell Using USB Rubber Ducky and PowerShell -- Generating a PowerShell Script -- Starting a Listener -- Hosting the PowerShell Script 
500 |a Running PowerShell. 
588 0 |a Online resource; title from digital title page (viewed on August 16, 2021). 
520 |a Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
776 0 8 |i Print version:  |a Khawaja, Gus.  |t Kali Linux Penetration Testing Bible.  |d Newark : John Wiley & Sons, Incorporated, ©2021  |z 9781119719083 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119719083/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38627432 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38579352 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6577242 
938 |a EBSCOhost  |b EBSC  |n 2918537 
938 |a YBP Library Services  |b YANK  |n 302158982 
938 |a YBP Library Services  |b YANK  |n 302101535 
994 |a 92  |b IZTAP