000 01948nam a2200277Ia 4500
001 on1237875209
003 OCoLC
007 t
008 210220s2018 scua 001 0 eng d
020 _a9781725031982
020 _a1725031981
035 _a(OCoLC)1237875209
040 _aTULIB
_beng
_cTULIB
050 _aQA76.9.A25
_bD587 2018
100 1 _aDieterle, Daniel W.
245 1 0 _aBasic security testing with Kali Linux /
_cDaniel W. Dieterle.
250 _a3rd ed.
260 _a[S.l. :
_bs.n.],
_cc2018.
300 _axv, 410 p. :
_bill.
500 _aIncludes index.
505 0 _aChapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.
630 0 4 _aLinux.
650 4 _aPenetration testing (Computer security)
650 4 _aComputer networks
_xSecurity measures.
942 _2lcc
_cBK
999 _c342
_d342