Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner
| Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner |
| Autore | Broad James |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
| Descrizione fisica | 1 online resource (238 p.) |
| Disciplina | 238 |
| Altri autori (Persone) | BindnerAndrew |
| Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-407883-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing
Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys Managing the SSH Service from the Kali GUI |
| Record Nr. | UNINA-9910459155103321 |
Broad James
|
||
| Waltham, MA : , : Syngress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner
| Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner |
| Autore | Broad James |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
| Descrizione fisica | 1 online resource (ix, 227 pages) : illustrations (some color) |
| Disciplina | 238 |
| Collana | Gale eBooks |
| Soggetto topico |
Penetration testing (Computer security)
Computer hackers |
| ISBN | 0-12-407883-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing
Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys Managing the SSH Service from the Kali GUI |
| Record Nr. | UNINA-9910792485103321 |
Broad James
|
||
| Waltham, MA : , : Syngress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner
| Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner |
| Autore | Broad James |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
| Descrizione fisica | 1 online resource (ix, 227 pages) : illustrations (some color) |
| Disciplina | 238 |
| Collana | Gale eBooks |
| Soggetto topico |
Penetration testing (Computer security)
Computer hackers |
| ISBN | 0-12-407883-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing
Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys Managing the SSH Service from the Kali GUI |
| Record Nr. | UNINA-9910815457603321 |
Broad James
|
||
| Waltham, MA : , : Syngress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||