miraclehilt.blogg.se

Kali linux books
Kali linux books






  1. #KALI LINUX BOOKS HOW TO#
  2. #KALI LINUX BOOKS PROFESSIONAL#

It is maintained and funded by Offensive Security.

#KALI LINUX BOOKS HOW TO#

What this book coversĬhapter 1, Introduction to Ethical Hacking, introduces you to the concepts of ethical hacking and penetration testing techniques and strategiesĬhapter 2, Building a Penetration Testing Lab, focuses on guiding you on how to use virtualization technologies to create a personalized virtual lab environment to practice your skills in a safe environment.Ĭhapter 3, Setting Up for Advanced Hacking Techniques, focuses on guiding you on how to set up both a Windows Active Directory lab and an enterprise wireless environment to perform advanced penetration testing techniques.Ĭhapter 4, Reconnaissance and Footprinting, introduces you to the importance of reconnaissance and techniques used during penetration testing.Ĭhapter 5, Exploring Active Information Gathering, focuses on performing active information gathering on targets and profiling devices.Ĭhapter 6, Performing Vulnerability Assessments, focuses on guiding you on how to perform vulnerability discovery using popular automation vulnerability assessment tools.Ĭhapter 7, Understanding Network Penetration Testing, focuses on exploring the fundamentals of network penetration testing, antimalware evasion techniques, and working with wireless network adaptersĬhapter 8, Performing Network Penetration Testing, focuses on discovering and exploiting security vulnerabilities that are commonly found in the real world.Ĭhapter 9, Advanced Network Penetration Testing – Post Exploitation, introduces you to post-exploitation techniques and strategies.Ĭhapter 10, Working with Active Directory Attacks, focuses on exploiting the trust on Windows Active Directory Domain Services on a network.Ĭhapter 11, Advanced Active Directory Attacks, focuses on performing an advanced exploitation of Active Directory, performing both lateral and vertical movement and taking over the domainĬhapter 12, Delving into Command and Control Tactics, introduces you to the importance of, and techniques for, establishing C2 during penetration testing.Ĭhapter 13, Advanced Wireless Penetration Testing, focuses on understanding wireless communication, vulnerabilities, and exploitation techniques.Ĭhapter 14, Performing Client-Side Attacks – Social Engineering, introduces you to how to use social engineering techniques to compromise the human mind during a cyber attack.Ĭhapter 15, Understanding Website Application Security, focuses on discovering the web application security risks that are described in the OWASP list of security vulnerabilities.Ĭhapter 16, Advanced Website Penetration Testing, focuses on performing web application security testing to discover and exploit security flaws.Ĭhapter 17, Best Practices for the Real World, provides guidelines for aspiring ethical hackers and penetration testers to ensure that, after completing this book, you have a wealth of valuable knowledge and can adapt to good practices within the industry.Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.

#KALI LINUX BOOKS PROFESSIONAL#

Whether you are new to the field of cybersecurity or a seasoned professional within the industry, this book has something for everyone and lots to learn while gaining the hands-on experience to get started as an ethical hacker and a penetration tester. This book can be used as a self-study guide and within classroom-based training on topics including discovering and exploiting vulnerabilities, ethical hacking techniques, and penetration testing strategies. This book is designed for students, trainers, lecturers, IT professionals, and those who simply have an interest in learning ethical hacking, penetration testing, and cybersecurity.

kali linux books

Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire








Kali linux books