Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing

With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core func...

Full description

Bibliographic Details
Main Author: Sharma, Himanshu
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing, 2019.
Edition:Second edition.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 05845cam a2200685Ii 4500
001 koha001013141
003 OCoLC
005 20250222065950.0
006 m d
007 cr unu||||||||
008 190516s2019 enka ob 000 0 eng d
035 |a koha001013141 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TEFOD  |d EBLCP  |d UKAHL  |d MERUC  |d UKMGB  |d OCLCF  |d YDX  |d N$T 
015 |a GBB995015  |2 bnb 
016 7 |a 019365488  |2 Uk 
019 |a 1091653735  |a 1096533161 
020 |a 9781789953701 
020 |a 1789953707 
020 |z 9781789952308 
037 |a CL0501000048  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Sharma, Himanshu,  |9 911056 
245 1 0 |a Kali Linux, an ethical hacker's cookbook  |b practical recipes that combine strategies, attacks, and tools for advanced penetration testing  |c Himanshu Sharma. 
250 |a Second edition. 
264 1 |a Birmingham, UK  |b Packt Publishing,  |c 2019. 
300 |a 1 online resource  |b illustrations 
500 |a Previous edition published: 2017. 
588 |a Description based on online resource; title from title page (Safari, viewed May 15, 2019). 
504 |a Includes bibliographical references. 
505 0 |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Kali -- An Introduction; Configuring Kali Linux; Getting ready; How to do it...; How it works...; Configuring the Xfce environment; How to do it...; Configuring the MATE environment; How to do it...; Configuring the LXDE environment; How to do it...; Configuring the E17 environment; How to do it...; Configuring the KDE environment; How to do it...; Prepping with custom tools; Getting ready; How to do it...; Aquatone; Subfinder; There's more...; Zone Walking using DNSRecon; Getting ready 
505 8 |a How to do it...There's more...; Setting up I2P for anonymity; How to do it...; There's more...; Pentesting VPN's ike-scan; Getting ready; How to do it...; Cracking the PSK; There's more...; Setting up proxychains; How to do it...; Using proxychains with Tor; Going on a hunt with Routerhunter; Getting ready; How to do it...; Chapter 2: Gathering Intel and Planning Attack Strategies; Getting a list of subdomains; How to do it...; Using Shodan for fun and profit; Getting ready; How to do it...; Shodan Honeyscore; How to do it...; Shodan plugins; How to do it...; Censys; How to do it...; See also 
505 8 |a Using Nmap to find open portsHow to do it...; Using scripts; See also; Bypassing firewalls with Nmap; How to do it...; TCP ACK scan (-sA); TCP Window scan (-sW); Idle scan; How it works...; Searching for open directories using GoBuster; How to do it...; Hunting for SSL flaws; How to do it...; See also; Automating brute force with BruteSpray; How to do it...; Digging deep with TheHarvester; How to do it...; How it works...; Finding technology behind webapps using WhatWeb; How to do it...; Scanning IPs with masscan; How to do it...; Finding origin servers with CloudBunny; How to do it... 
505 8 |a Sniffing around with KismetHow to do it...; See also; Testing routers with Firewalk; How to do it...; How it works...; Chapter 3: Vulnerability Assessment -- Poking for Holes; Using the infamous Burp; How to do it...; Exploiting WSDLs with Wsdler; How to do it...; Using Intruder; How to do it...; Using golismero; How to do it...; See also; Exploring Searchsploit; How to do it...; Exploiting routers with routersploit; Getting ready; How to do it...; Using Metasploit; How to do it...; Automating Metasploit; How to do it...; Writing a custom resource script; How to do it...; See also 
505 8 |a Setting up a database in MetasploitHow to do it...; Generating payloads with MSFPC; How to do it...; Emulating threats with Cobalt Strike; Getting ready; How to do it...; There's more...; Chapter 4: Web App Exploitation -- Beyond OWASP Top 10; Exploiting XSS with XSS Validator; Getting ready; How to do it...; Injection attacks with sqlmap; How to do it...; See also; Owning all .svn and .git repositories; How to do it...; Winning race conditions; How to do it...; See also; Exploiting XXEs; How to do it...; See also; Exploiting Jboss with JexBoss; How to do it...; Exploiting PHP Object Injection 
520 |a With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities. 
630 0 0 |a Kali Linux.  |9 910799 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587  |9 910799 
653 0 |a Penetration testing (Computer security) 
653 0 |a Computer security. 
653 0 |a Computers  |x Access control. 
653 0 |a Computer networks  |x Security measures. 
653 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
653 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
653 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
653 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
653 7 |a COMPUTERS / Security / General.  |2 bisacsh 
653 7 |a COMPUTERS / Networking / Security.  |2 bisacsh 
653 7 |a COMPUTERS / Security / Online Safety & Privacy.  |2 bisacsh 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2094781.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013141 
910 |a EBSCO eBooks 
999 |c 1013141  |d 1013141 
039