Search Books
DSP for Embedded and Real-T… Handbook on Securing Cyber-…

Hacking with Kali: Practical Penetration Testing Techniques

Author James Broad, Andrew Bindner
Publisher Syngress
Category COMPUTERS
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
23.65 39.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $14.75

✓ Usually ships in 1-2 business days

Share:
Book Details
PublisherSyngress
ISBN / ASIN0124077498
ISBN-139780124077492
AvailabilityUsually ships in 1-2 business days
Sales Rank1,168,436
CategoryCOMPUTERS
MarketplaceUnited States 🇺🇸

Description

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You ll learn how to configure networking components, storage devices and system services such as DHCP and web services.

Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the Kali information, resources and distribution downloads
  • Hands-on exercises reinforce topics
Deploying IP and MPLS QoS for Multiservice Networks: T…
View
Satellite and Terrestrial Radio Positioning Techniques…
View
Letting Go of the Words: Writing Web Content that Work…
View
DSP for Embedded and Real-Time Systems
View
Handbook on Securing Cyber-Physical Critical Infrastru…
View
The Basics of IT Audit: Purposes, Processes, and Pract…
View
Python Forensics: A workbench for inventing and sharin…
View
Machine Learning: A Bayesian and Optimization Perspect…
View