Buch, Englisch, 238 Seiten, Format (B × H): 192 mm x 235 mm, Gewicht: 425 g
Practical Penetration Testing Techniques
Buch, Englisch, 238 Seiten, Format (B × H): 192 mm x 235 mm, Gewicht: 425 g
ISBN: 978-0-12-407749-2
Verlag: Elsevier LTD, Oxford
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services.
Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.
This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
Zielgruppe
<p>Information Security professionals of all levels, hackers, systems administrators, network administrators, beginning and intermediate professional Pen Testers, and an academic audience among information security majors. </p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Introduction
Getting and Running Kali
Hard Drive Installation
Thumb Drive Installation
SD Card Installation
Building a Custom Live CD
Updating Kali and Installing Additional Software
Configuring Network Devices
Configuring Servers and Services
Configuring and Accessing Internal and External Media
Introduction to the Pen Testing Life Cycle
Reconnaissance
Scanning
Exploitation
Maintaining Access