LEADER 05414nam 2200661 450 001 9910459155103321 005 20200520144314.0 010 $a0-12-407883-4 035 $a(CKB)2660000000011109 035 $a(EBL)1115177 035 $a(OCoLC)865329755 035 $a(SSID)ssj0001081522 035 $a(PQKBManifestationID)11580296 035 $a(PQKBTitleCode)TC0001081522 035 $a(PQKBWorkID)11078586 035 $a(PQKB)10303730 035 $a(MiAaPQ)EBC1115177 035 $a(CaSebORM)9780124077492 035 $a(Au-PeEL)EBL1115177 035 $a(CaPaEBR)ebr10815311 035 $a(CaONFJC)MIL550821 035 $a(OCoLC)870340083 035 $a(EXLCZ)992660000000011109 100 $a20131221d2014 uy| 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking with Kali $epractical penetration testing techniques /$fJames Broad, Andrew Bindner 205 $aFirst edition. 210 1$aWaltham, MA :$cSyngress,$d2014. 215 $a1 online resource (238 p.) 300 $aDescription based upon print version of record. 311 $a0-12-407749-8 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing 327 $aSocial Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager 327 $aInstalling the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball 327 $aA Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards 327 $aConnection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys 327 $aManaging the SSH Service from the Kali GUI 330 $aHacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration 606 $aPenetration testing (Computer security) 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures. 676 $a238 700 $aBroad$b James$0959435 701 $aBindner$b Andrew$0959436 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910459155103321 996 $aHacking with Kali$92173949 997 $aUNINA LEADER 00766ojm 2200265z- 450 001 9910155716803321 005 20230913112557.0 010 $a1-5124-4738-2 035 $a(CKB)3710000000976369 035 $a(BIP)058891964 035 $a(EXLCZ)993710000000976369 100 $a20231107c2017uuuu -u- - 101 0 $aeng 200 10$aI'm From Outer Space! : Meet an Alien 210 $cLerner 215 $a1 online resource (24 p.) $cill 330 8 $ahttps://ebooks.lernerbooks.com/reader/9781512479133 517 $aI'm From Outer Space! 676 $a001.942 700 $aBullard$b Lisa$01435157 702 $aMoran$b Mike$4ill 906 $aAUDIO 912 $a9910155716803321 996 $aI'm From Outer Space! : Meet an Alien$93592370 997 $aUNINA