
Beginning Ethical Hacking with Kali Linux
Sobre o livro
Chapter 01: Security Trends
• The Nature and Perspective
• The OSI Security Architecture
• The Security Attacks, Services and Mechanisms
Chapter 02: Virtual Box
Chapter 03: Common Linux Commands
Chapter 04: Common Networking Terminology
Chapter 05: Building a Web Server
• Downloading Kali Linux
• Relation between Kali and Python
• Installing Wing IDE Editor
Chapter 06: Kali Linux
• What is Kali Linux
• Exploring the Kali-Inside
• How to Update
Chapter 07: Kali and Python
• First Penetration using Python
• TCP Client in Python and Services
• Raw Binary Packets
• Port Scanning using NMAP
Chapter 08: Information Gathering
• Further Penetration Testing
• Tools we need
• Dmitry/DNSenum/Maltego and Others
• Five phases of Penetration Testing
Chapter 09: SQL Mapping
• Sniffing (in TWO parts)
• SQL Injection (in FOUR parts)
• Brute Force (in TWO parts)
Chapter 10: Vulnerability Analysis
• Tools
• Spike/Open VAS/Vega and others
Chapter 11: Information Assurance Model
• What is IAM
• How it Works• Why it is Important
Chapter 12: Metaspoilt in Kali Linux
• Architecture
• Mixims and Plug-ins in Ruby
• MstCLI/Msf Console (in detail, how it works)
• Exploit in Metaspoilt
• Important Commands in Metaspoilt
• Payload Basics/Different Payloads
• Database and its Vulnerability
Chapter 13: Hashes and Passwords
• Password Testing
• Command-line Tools
• John the Ripper
• Rainbow
• Pass the Hash
• Nature and Perspective
• Model of Conventional Cryptosystem
• Introduction to Cryptography, and types of Attacks on Encrypted Messages
• Symmetric Cyphers
• Tools we use
• Exploiting Linux with Metaspoilt
• Exploiting Windows with Armitage
• Persistent Access
Ficha técnica
- Autor
- Sinha, Sanjib, Sanjib Sinha
- Editora
- UmLivro
- Formato
- BOOK
- Encadernação
- Capa comum
- ISBN
- 9781484238905
- EAN
- 9781484238905
- Ano de Publicação
- 2018
- Número de Páginas
- 440
- Dimensões
- 23.4 x 15.6 x 3 cm
- Peso
- 0.61 kg
- Idioma
- pt-BR
- Edição
- 1
- SKU
- 9781484238905





