Kali Linux Intrusion and Exploitation Cookbook
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the form of easy to follow recipes. Right Information gathering, vulnerability assessment & penetration testing for Web, wired and wireless Network this book will help you get grips on exploiting vulnerabilities in your system and fix those security anomalies in no time.
Offered by
Difficulty Level
Intermediate
Completion Time
17h4m
Language
English
About Book
Who Is This Book For?
This book is intended for those who want to know more about information security. In particular, it's ideal for system administrators and system architects who want to ensure that the infrastructure and systems they are creating and managing are secure. This book helps both beginners and intermediates by allowing them to use it as a reference book and to gain in-depth knowledge.
Kali Linux Intrusion and Exploitation Cookbook
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 17h4m total length
Setting up environment
Network Information Gathering
Vulnerability Assessment
Exploitation
Information Gathering and Scanning
Dive into Network
Exploitation and Advanced Techniques
System Exploitation
Privilege Escalation & Post Exploitation
Wireless Information Gathering
Appendices
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!