𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Basic Security Testing with Kali Linux

✍ Scribed by Daniel W. Dieterle


Publisher
CreateSpace
Year
2013
Tongue
English
Leaves
242
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In β€œBasic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

Kali Linux Introduction and Overview
Metasploit & Metasploitable 2 Tutorials
Information Gathering
A section on Shodan (the β€œHacker’s Google”)
Exploiting Windows and Linux Systems
Escalating Privileges in Windows
Wireless (WiFi) Attacks
Social Engineering Attacks
Password Attacks
Kali on a Raspberry Pi
Securing your Network
Though no network can be completely β€œHacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.


πŸ“œ SIMILAR VOLUMES


Basic Security Testing with Kali Linux 2
✍ Daniel W. Dieterle πŸ“‚ Library πŸ“… 2016 πŸ› CreateSpace Independent Publishing 🌐 English

Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do.<br>In Basic Security Testing with Kali Linux 2, you will learn basic examples of how hackers find out inform

Advanced Security Testing with Kali Linu
✍ Daniel Dieterle πŸ“‚ Library 🌐 English

<span>Advanced Security Testing with Kali Linux - the last book in my offensive security with Kali training books. This book picks up where my previous ones left off and dives deeper into more advanced security topics. You will learn about AV bypass, Command &amp; Control (C2) frameworks, Web App pe