Instant Kali Linux a quick guide to learn the most widely-used operating system by network security professionals ; [short, fast, focused 🔍
Abhinav Singh Packt Publishing, Limited, EBL-Schweitzer, Online-ausg, Birmingham, 2013
英语 [en] · PDF · 3.6MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
A quick guide to learn the most widely-used operating system by network security professionals
**Overview**
* Learn something new in an Instant! A short, fast, focused guide delivering immediate results
* Covers over 30 different tools included in Kali Linux
* Easy guide to set up and install Kali Linux under different hardware sets
* Step by step examples to get started with pen-testing tools
**In Detail**
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.
Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.
Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.
**What you will learn from this book**
* Install Kali Linux on standalone or virtual machines
* Understand the file structure of Kali Linux
* Gather information and scanning using tools like Nmap
* Undertake vulnerability assessments and penetration testing
* Work with exploitation frameworks
* Penetration testing with web applications
* Break passwords, create backdoors, and rooting etc
* Complete forensic analysis using Kali
**Approach**
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.
**Who this book is written for**
If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical language which requires only a basic knowledge of security assessments and the Linux operating system.
备用文件名
lgli/b837fcf7a22dd1269e58a69ec374b4a3.pdf
备用文件名
lgrsnf/b837fcf7a22dd1269e58a69ec374b4a3.pdf
备用文件名
zlib/Computers/Operating Systems/Abhinav Singh/Instant Kali Linux_2270273.pdf
备选标题
WordPress Theme Development Beginner's Guide Third Edition
备选作者
Singh, Abhinav
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Packt Publishing, Birmingham [UK], 2013
备用版本
1, 2013-10-25
元数据中的注释
0
元数据中的注释
lg1101317
元数据中的注释
{"edition":"online-ausg","isbns":["1849695660","1849695679","9781849695664","9781849695671"],"last_page":68,"publisher":"Packt Publishing Ltd","series":"EBL-Schweitzer"}
备用描述
A quick guide to learn the most widely-used operating system by network security professionals
Overview
Learn something new in an Instant! A short, fast, focused guide delivering immediate results Covers over 30 different tools included in Kali Linux Easy guide to set up and install Kali Linux under different hardware sets Step by step examples to get started with pen-testing tools In Detail
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.
Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.
Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.
What you will learn from this book
Install Kali Linux on standalone or virtual machines Understand the file structure of Kali Linux Gather information and scanning using tools like Nmap Undertake vulnerability assessments and penetration testing Work with exploitation frameworks Penetration testing with web applications Break passwords, create backdoors, and rooting etc Complete forensic analysis using Kali Approach
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.
Who this book is written for
If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical language which requires only a basic knowledge of security assessments and the Linux operating system.</p>
备用描述
<p><h2>In Detail</h2><p>Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.</p><p>Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.</p><p>Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.</p><h2>Approach</h2><p>Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by mastering various tools and techniques.</p><h2>Who this book is for</h2><p>If you are a beginners or an experienced security professional who is willing to dive deeper into the world of information security, then this book is perfect for you. The book is written is simple technical language which requires only a basic knowledge of security assessments and the Linux operating system.</p></p>
备用描述
Cover......Page 1
Copyright......Page 3
Credits......Page 4
About the Author......Page 5
About the Reviewers......Page 6
www.packtpub.com......Page 8
packtlib.packtpub.com......Page 9
Table of Contents......Page 14
Instant Kali Linux......Page 16
So, what is Kali Linux?......Page 18
Step 1 – download and boot......Page 19
Step 2 – setting the dual boot......Page 20
Installing Kali as a virtual machine......Page 21
And that's it......Page 22
Understanding the memory layout......Page 23
DNSmap analysis......Page 24
Network sniffing......Page 25
Working with vulnerability assessment tools......Page 26
Web app penetration testing in Kali......Page 28
WebScarab proxy......Page 29
Attacking the database using sqlninja......Page 30
The Websploit framework......Page 31
John the Ripper......Page 33
Working with RainbowCrack......Page 34
Working with Kismet......Page 35
Fern WIFI Cracker......Page 38
Bluetooth auditing......Page 39
Browser Exploitation Framework......Page 40
Social Engineer Toolkit......Page 43
Working with forensics tools......Page 44
Autopsy Forensic Browser......Page 45
The Sleuth Kit......Page 47
Information gathering with Nmap......Page 48
Breaking wireless passwords using Aircrack......Page 50
Web app penetration testing with Burp Suite......Page 53
Burp proxy......Page 54
Burp Spider......Page 55
Burp Intruder......Page 56
Features of Metasploit......Page 57
Network analysis with Wireshark......Page 60
Rootkit-scanning forensics with chkrootkit......Page 61
File analysis using md5deep......Page 62
Community......Page 64
Twitter......Page 65
备用描述
Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Kali Linux; So, what is Kali Linux?; Installation; Step 1 - download and boot; Step 2 - setting the dual boot; Step 3 - beginning with the installation; Installing Kali as a virtual machine; Updating Kali Linux; And that's it; Quick start - getting your tools right; Understanding the memory layout; Information gathering and sniffing with Kali Linux; DNSmap analysis; Network scanners; Detecting live hosts; SSL analysis; Network sniffing
开源日期
2013-12-13
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。