| 000 | 01948nam a2200277Ia 4500 | ||
|---|---|---|---|
| 001 | on1237875209 | ||
| 003 | OCoLC | ||
| 007 | t | ||
| 008 | 210220s2018 scua 001 0 eng d | ||
| 020 | _a9781725031982 | ||
| 020 | _a1725031981 | ||
| 035 | _a(OCoLC)1237875209 | ||
| 040 |
_aTULIB _beng _cTULIB |
||
| 050 |
_aQA76.9.A25 _bD587 2018 |
||
| 100 | 1 | _aDieterle, Daniel W. | |
| 245 | 1 | 0 |
_aBasic security testing with Kali Linux / _cDaniel W. Dieterle. |
| 250 | _a3rd ed. | ||
| 260 |
_a[S.l. : _bs.n.], _cc2018. |
||
| 300 |
_axv, 410 p. : _bill. |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aChapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion. | |
| 630 | 0 | 4 | _aLinux. |
| 650 | 4 | _aPenetration testing (Computer security) | |
| 650 | 4 |
_aComputer networks _xSecurity measures. |
|
| 942 |
_2lcc _cBK |
||
| 999 |
_c342 _d342 |
||