Learn Kali Linux 2018

A hands-on guide for learning web application and network penetration testing using Kali Linux 2018.2

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Learn Kali Linux 2018 by Glen D. Singh, Joshua Crumbaugh, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Glen D. Singh, Joshua Crumbaugh ISBN: 9781789612622
Publisher: Packt Publishing Publication: October 9, 2019
Imprint: Packt Publishing Language: English
Author: Glen D. Singh, Joshua Crumbaugh
ISBN: 9781789612622
Publisher: Packt Publishing
Publication: October 9, 2019
Imprint: Packt Publishing
Language: English

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

About This Book

  • Learn to use Linux commands like ethical hackers to gain control of your environment.
  • Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks and more.
  • A practical guide to getting you up and running with Kali Linux from scratch.

Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

What You Will Learn

  • Learn about Basics of Ethical Hacking
  • Install-Kali Linux a Penetration Testing Operating System
  • Perform Wireless Network Penetration Testing
  • Understand Web Application Penetration Testing
  • Determine Social Engineering Penetration Testing
  • Crack WEP/WPA/WPA2 encryptions using various methods

In Detail

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

About This Book

Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

What You Will Learn

In Detail

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

More books from Packt Publishing

Cover of the book Apex Design Patterns by Glen D. Singh, Joshua Crumbaugh
Cover of the book Exploring SE for Android by Glen D. Singh, Joshua Crumbaugh
Cover of the book Scaling Big Data with Hadoop and Solr by Glen D. Singh, Joshua Crumbaugh
Cover of the book Linux Device Drivers Development by Glen D. Singh, Joshua Crumbaugh
Cover of the book Python Web Scraping Cookbook by Glen D. Singh, Joshua Crumbaugh
Cover of the book Instant E-Commerce with Magento: Build a Shop by Glen D. Singh, Joshua Crumbaugh
Cover of the book Windows Forensics Cookbook by Glen D. Singh, Joshua Crumbaugh
Cover of the book LaTeX Beginner's Guide by Glen D. Singh, Joshua Crumbaugh
Cover of the book Microsoft Hyper-V PowerShell Automation by Glen D. Singh, Joshua Crumbaugh
Cover of the book PySide GUI Application Development by Glen D. Singh, Joshua Crumbaugh
Cover of the book Torque 3D Game Development Cookbook by Glen D. Singh, Joshua Crumbaugh
Cover of the book CodeIgniter Web Application Blueprints by Glen D. Singh, Joshua Crumbaugh
Cover of the book Building RESTful Web Services with .NET Core by Glen D. Singh, Joshua Crumbaugh
Cover of the book Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained by Glen D. Singh, Joshua Crumbaugh
Cover of the book ArcGIS By Example by Glen D. Singh, Joshua Crumbaugh
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy