Kali Linux 2018: Assuring Security by Penetration Testing

Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Kali Linux 2018: Assuring Security by Penetration Testing by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali ISBN: 9781789346626
Publisher: Packt Publishing Publication: October 26, 2018
Imprint: Packt Publishing Language: English
Author: Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
ISBN: 9781789346626
Publisher: Packt Publishing
Publication: October 26, 2018
Imprint: Packt Publishing
Language: English

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition

Key Features

  • Rely on the most updated version of Kali to formulate your pentesting strategies
  • Test your corporate network against threats
  • Explore new cutting-edge wireless penetration tools and features

Book Description

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.

This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You’ll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you’ll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you’ll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You’ll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.

By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.

What you will learn

  • Conduct the initial stages of a penetration test and understand its scope
  • Perform reconnaissance and enumeration of target networks
  • Obtain and crack passwords
  • Use Kali Linux NetHunter to conduct wireless penetration testing
  • Create proper penetration testing reports
  • Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing
  • Carry out wireless auditing assessments and penetration testing
  • Understand how a social engineering attack such as phishing works

Who this book is for

This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition

Key Features

Book Description

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.

This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You’ll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you’ll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you’ll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You’ll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.

By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.

What you will learn

Who this book is for

This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

More books from Packt Publishing

Cover of the book C# 7 and .NET Core 2.0 High Performance by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Azure IoT Development Cookbook by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Liferay Portal Systems Development by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Blender 3D: Designing Objects by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Go Web Development Cookbook by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Moodle Course Design Best Practices by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book jQuery UI 1.8: The User Interface Library for jQuery by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Instant Apache Maven Starter by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Advanced Analytics with R and Tableau by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book jQuery Mobile Web Development Essentials - Third Edition by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Linux: Embedded Development by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Socket.IO Cookbook by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Linux Mint Essentials by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book JIRA 5.x Development Cookbook by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
Cover of the book Hands-On Deep Learning with TensorFlow by Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Shiva V. N Parasram, Tedi Heriyanto, Shakeel Ali
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy