Buscar
Beginning Ethical Hacking with Kali Linux
Cód:
491_9781484238905

Por: R$ 418,45ou X de

Comprar
Chapter 01: Security Trends•The Nature and Perspective•The OSI Security Architecture•The Security Attacks, Services and MechanismsChapter 02: Virtual BoxChapter 03: Common Linux CommandsChapter 04: Common Networking TerminologyChapter 05: Building a Web Server•Downloading Kali Linux•Relation between Kali and Python•Installing Wing IDE EditorChapter 06: Kali Linux•What is Kali Linux•Exploring the Kali-Inside•How to UpdateChapter 07: Kali and Python•First Penetration using Python•TCP Client in Python and Services•Raw Binary Packets•Port Scanning using NMAPChapter 08: Information Gathering•Further Penetration Testing•Tools we need•Dmitry/DNSenum/Maltego and Others•Five phases of Penetration TestingChapter 09: SQL Mapping•Sniffing (in TWO parts)•SQL Injection (in FOUR parts)•Brute Force (in TWO parts)Chapter 10: Vulnerability Analysis•Tools•Spike/Open VAS/Vega and othersChapter 11: Information Assurance Model•What is IAM•How it Works•Why it is ImportantChapter 12: Metaspoilt in Kali Linux•Architecture•Mixims and Plug-ins in Ruby•MstCLI/Msf Console (in detail, how it works)•Exploit in Metaspoilt•Important Commands in Metaspoilt•Payload Basics/Different Payloads•Database and its VulnerabilityChapter 13: Hashes and Passwords•Password Testing•Command-line Tools•John the Ripper•Rainbow•Pass the HashChapter 14: Classical encryption technique•Nature and Perspective•Model of Conventional Cryptosystem•Introduction to Cryptography, and types of Attacks on Encrypted Messages•Symmetric CyphersChapter 15: Exploiting Targets•Tools we use•Exploiting Linux with Metaspoilt•Exploiting Windows with Armitage•Persistent Access
Veja mais

Calcule o valor do frete e prazo de entrega para a sua região

Quem comprou também comprou

Quem viu também comprou

Quem viu também viu