Mastering Kali Linux for Advanced Penetration Testing,2nd Edition

Mastering Kali Linux for Advanced Penetration Testing Second Edition

Mastering Kali Linux for Advanced Penetration Testing Second Edition
by: Vijay Kumar Velu
ISBN-10: 1787120236
ISBN-13: 9781787120235
Edition 版次: 2nd Revised edition
Publication Date 出版日期: 2017-09-06
Print Length 页数: 538


Book Description
By finelybook

Key Features
Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Book Description
By finelybook

This book will take you,as a tester,through the reconnaissance,exploitation,and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack,specific routes to the target will be examined,including bypassing physical security. You will also get to grips with concepts such as social engineering,attacking wireless networks,web services,and remote access connections. Finally,you will focus on the most vulnerable part of the network-directly attacking the end user.
This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.
What you will learn
Select and configure the most effective tools from Kali Linux to test network security
Employ stealth to avoid detection in the network being tested
Recognize when stealthy attacks are being used against your network
Exploit networks and data systems using wired and wireless networks as well as web services
Identify and download valuable data from target systems
Maintain access to compromised systems
Use social engineering to compromise the weakest part of the network-the end users
Contents
Chapter 1. Getting Up and Running with Cassandra
Chapter 2. The First Table
Chapter 3. Organizing Related Data
Chapter 4. Beyond Key-Value Lookup
Chapter 5. Establishing Relationships
Chapter 6. Denormalizing Data for Maximum Performance
Chapter 7. Expanding Your Data Model
Chapter 8. Collections,Tuples,and User-Defined Types
Chapter 9. Aggregating Time-Series Data
Chapter 10. How Cassandra Distributes Data
Chapter 11. Cassandra Multi-Node Cluster
Chapter 12. Application Development Using the Java Driver
Chapter 13. Peeking under the Hood
Chapter 14. Authentication and Authorization

相关文件下载地址

下载地址 Download解决验证以访问链接!
打赏
未经允许不得转载:finelybook » Mastering Kali Linux for Advanced Penetration Testing,2nd Edition

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫