|
![]() |
|||
|
||||
OverviewIn this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks. Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Mastering Kali Linux will serve as an excellent source of information for the security professional and novice alike! What you will learn from this book Install and setup Kali Linux on multiple platforms Customize Kali Linux to your individual needs Locate vulnerabilities with Nessus and OpenVAS Exploit vulnerabilities you've found with Metasploit Learn multiple solutions to escalate privileges on a compromised machine Understand how to use Kali Linux in all phases of a penetration test Crack WEP/WPA/WPA2 encryption Simulate an actual penetration test using Kali Linux Full Product DetailsAuthor: MR Ajay Kumar TiwariPublisher: Createspace Independent Publishing Platform Imprint: Createspace Independent Publishing Platform Dimensions: Width: 15.20cm , Height: 1.70cm , Length: 22.90cm Weight: 0.472kg ISBN: 9781511617765ISBN 10: 1511617764 Pages: 252 Publication Date: 06 April 2015 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationHi, My Name is Ajay Kumar tiwari . I am an IT Security Guy with keen interest in VAPT, Wireless, Mobile Security and Exploit Development. Presently, I am working as a Chief Cyber Security Architect for a Confidential Organization in Germany and Russia. I am the author of Mastering Kali Linux, Python for Hackers, Linux Hacker and Easiest way to Become to Hacker Book I hold C-EH, CISE, and OSWP Certification . Additionally, during my studies, I was the ambassador for EC-COUNCIL programs in my university. I have a collective experience of over 6+ years in IT Security and i run my Web Application Penetration Testing Course for Vidhyavilla, Delhi through distance learning Packages. I have delivered 90+ workshops on ethical hacking and penetration testing among various reputed colleges in India and have delivered corporate trainings on Exploit development and Penetration testing in India . I spoke at various IT security conferences, some of my articles and research papers are available on the internet, and you can find some in popular security magazines like Hakin9 and EForensics (Wireless Forensics, iOS forensics, Mobile forensics). I have been acknowledged to find vulnerabilities in Offensive Security, Rapid7, AT&T, Facebook, Apple, BlackBerry, Redhat, Nokia, Microsoft, Adobe, Baracudda Labs, Kaneva, Zynga.com and CERT India. Tab Content 6Author Website:Countries AvailableAll regions |