Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking. 2 Ed

Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking. 2 Ed

Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking. 2 Ed
Автор: Messier Ric
Дата выхода: 2024
Издательство: O’Reilly Media, Inc.
Количество страниц: 180
Размер файла: 1.4 MB
Тип файла: PDF
Добавил: codelibs
 Проверить на вирусы

1. Foundations of Kali Linux

Heritage of Linux

About Linux

Acquiring and Installing Kali Linux

Virtual Machines

Low Cost Computing

Windows Subsystem for Linux (WSL)

Desktops

Xfce Desktop

GNOME Desktop

Logging In Through the Desktop Manager

Cinnamon and MATE

Using the Command Line

File and Directory Management

Process Management

Other Utilities

User Management

Service Management

Package Management

Log Management

Summary

Quiz Questions

Useful Resources

2. Network Security Testing Basics

Security Testing

Network Security Testing

Monitoring

Layers

Stress Testing

Denial-of-Service Tools

Encryption Testing

Packet Captures

Using tcpdump

Berkeley Packet Filters

Wireshark

Poisoning Attacks

ARP Spoofing

DNS Spoofing

Summary

Quiz Questions

Useful Resources

With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering.

Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis.

  • Explore the breadth of tools available on Kali Linux
  • Understand the value of security testing and examine the testing types available
  • Learn the basics of penetration testing through the entire attack lifecycle
  • Install Kali Linux on multiple systems, both physical and virtual
  • Discover how to use different security-focused tools
  • Structure a security test around Kali Linux tools
  • Extend Kali tools to create advanced attack techniques
  • Use Kali Linux to generate reports once testing is complete

Похожее:

Список отзывов:

Нет отзывов к книге.