Cargando…

Learning Kali Linux : security testing, penetration testing, and ethical hacking /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Messier, Ric (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1045069089
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 180720t20182018cau o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d OCLCF  |d YDX  |d TEFOD  |d AAA  |d NRC  |d UKAHL  |d VT2  |d C6I  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1045669903  |a 1061032162 
020 |a 9781492028666  |q (electronic bk.) 
020 |a 1492028665  |q (electronic bk.) 
020 |a 9781492028659  |q (electronic bk.) 
020 |a 1492028657  |q (electronic bk.) 
020 |z 9781492028697 
020 |z 149202869X 
029 1 |a AU@  |b 000066232776 
035 |a (OCoLC)1045069089  |z (OCoLC)1045669903  |z (OCoLC)1061032162 
037 |a FC1A79E0-4245-44FB-833B-17B17A78920A  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .M477 2018eb 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Messier, Ric,  |e author. 
245 1 0 |a Learning Kali Linux :  |b security testing, penetration testing, and ethical hacking /  |c Ric Messier. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 23, 2018). 
505 0 |a Intro; Copyright; Table of Contents; Preface; What This Book Covers; Who This Book Is For; The Value and Importance of Ethics; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Foundations of Kali Linux; Heritage of Linux; About Linux; Acquiring and Installing Kali Linux; Desktops; GNOME Desktop; Logging In Through the Desktop Manager; Xfce Desktop; Cinnamon and MATE; Using the Command Line; File and Directory Management; Process Management; Other Utilities; User Management; Service Management; Package Management 
505 8 |a Log ManagementSummary; Useful Resources; Chapter 2. Network Security Testing Basics; Security Testing; Network Security Testing; Monitoring; Layers; Stress Testing; Denial-of-Service Tools; Encryption Testing; Packet Captures; Using tcpdump; Berkeley Packet Filters; Wireshark; Poisoning Attacks; ARP Spoofing; DNS Spoofing; Summary; Useful Resources; Chapter 3. Reconnaissance; What Is Reconnaissance?; Open Source Intelligence; Google Hacking; Automating Information Grabbing; Recon-NG; Maltego; DNS Reconnaissance and whois; DNS Reconnaissance; Regional Internet Registries 
505 8 |a Passive ReconnaissancePort Scanning; TCP Scanning; UDP Scanning; Port Scanning with Nmap; High-Speed Scanning; Service Scanning; Manual Interaction; Summary; Useful Resources; Chapter 4. Looking for Vulnerabilities; Understanding Vulnerabilities; Vulnerability Types; Buffer Overflow; Race Condition; Input Validation; Access Control; Local Vulnerabilities; Using lynis for Local Checks; OpenVAS Local Scanning; Root Kits; Remote Vulnerabilities; Quick Start with OpenVAS; Creating a Scan; OpenVAS Reports; Network Device Vulnerabilities; Auditing Devices; Database Vulnerabilities 
505 8 |a Identifying New VulnerabilitiesSummary; Useful Resources; Chapter 5. Automated Exploits; What Is an Exploit?; Cisco Attacks; Management Protocols; Other Devices; Exploit Database; Metasploit; Starting with Metasploit; Working with Metasploit Modules; Importing Data; Exploiting Systems; Armitage; Social Engineering; Summary; Useful Resources; Chapter 6. Owning Metasploit; Scanning for Targets; Port Scanning; SMB Scanning; Vulnerability Scans; Exploiting Your Target; Using Meterpreter; Meterpreter Basics; User Information; Process Manipulation; Privilege Escalation; Pivoting to Other Networks 
505 8 |a Maintaining AccessSummary; Useful Resources; Chapter 7. Wireless Security Testing; The Scope of Wireless; 802.11; Bluetooth; Zigbee; WiFi Attacks and Testing Tools; 802.11 Terminology and Functioning; Identifying Networks; WPS Attacks; Automating Multiple Tests; Injection Attacks; Password Cracking on WiFi; besside-ng; coWPAtty; Aircrack-ng; Fern; Going Rogue; Hosting an Access Point; Phishing Users; Wireless Honeypot; Bluetooth Testing; Scanning; Service Identification; Other Bluetooth Testing; Zigbee Testing; Summary; Useful Resources; Chapter 8. Web Application Testing; Web Architecture 
520 8 |a Annotation  |b With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming for both experienced and aspiring security professionals alike. Which tools are most appropriate for conducting various security tests and penetration tests? This practical book covers Kali's broad range of security capabilities, and helps you identify the tools you need to conduct a wide range of tests. You'll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux, and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools, and creating your own toolset. Learn tools for stress testing network stacks and applicationsPerform network reconnaissance to determine what's available to attackersUse scanners to identify technical vulnerabilities in the networkExecute penetration tests using automated exploit tools such as MetasploitUse cracking tools to see if passwords meet complexity requirementsTest wireless capabilities by injecting frames and cracking passwordsAssess web application vulnerabilities with automated or proxy-based toolsCreate advanced attack techniques by extending Kali tools or developing your ownUse Kali Linux to generate reports once testing is complete. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Hacking. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
776 0 8 |i Print version:  |z 149202869X  |z 9781492028697  |w (OCoLC)1026293321 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492028680/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35960204 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35903470 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5455417 
938 |a EBSCOhost  |b EBSC  |n 1853517 
938 |a YBP Library Services  |b YANK  |n 15609370 
938 |a YBP Library Services  |b YANK  |n 15606579 
994 |a 92  |b IZTAP