Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition Kindle Edition

★★★★★ 4.9 70 reviews

$49.59
Price when purchased online
Free shipping Free 30-day returns

Sold and shipped by dreamlikeupholstery.com
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here.
$49.59
Price when purchased online
Free shipping Free 30-day returns

How do you want your item?
You get 30 days free! Choose a plan at checkout.
Shipping
Arrives May 14
Free
Pickup
Check nearby
Delivery
Not available

Sold and shipped by dreamlikeupholstery.com
Free 30-day returns Details

Product details

Management number 220801369 Release Date 2026/05/03 List Price $19.84 Model Number 220801369
Category

"One of the best Linux books of all time" - BookAuthority"One of the best Network Security books of all time" - BookAuthorityA practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackersKey FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secure systemsDiscover stealth techniques to go undetected and penetrate modern infrastructuresExplore red teaming techniques to exploit a secured environmentBook DescriptionKali Linux, a successor to BackTrack, is one of the most popular Linux distributions used by security professionals and penetration testers to identify and exploit vulnerabilities in the target environment.As a tester or security practitioner, you'll be taken through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. You'll start by setting up a laboratory environment to validate an application using pentesting tools and techniques. You'll then cover passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll learn how to select, use, customize, and interpret results from different vulnerability scanners, and examine specific routes to the target, such as bypassing physical security and data exfiltration techniques. This Kali Linux book covers concepts such as attacking wireless networks, web services, and embedded devices and gives insights into social engineering.Once you are confident with these topics, you'll delve into the practical aspects of attacking user client systems by backdooring with fileless techniques, and then shift focus to the most vulnerable part of the network - directly attacking the end user.By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, and understand pentesting and hacking techniques employed on embedded peripheral devices.What you will learnConfigure the most effective Kali Linux tools to test infrastructure securityLeverage Kali Linux to avoid detection in a controlled infrastructureExploit networks and data systems using wired and wireless networks as well as web servicesIdentify and download valuable data from target systemsMaintain access to compromised systemsUse social engineering to compromise the weakest part of a network - the end usersWho this book is forThis third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, or security consultant who wants to optimize infrastructure security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.Table of ContentsGoal-based Penetration Testing with Kali LinuxOpen Source Intelligence and Passive ReconnaissanceActive Reconnaissance of the External and Internal NetworksVulnerability AssessmentPhysical Security and Social EngineeringWireless and Bluetooth AttacksReconnaissance and Exploitation of Web-based ApplicationsClient-side ExploitationBypassing Security ControlsExploitationAction on the Objective and Lateral movementPrivilege EscalationCommand and ControlEmbedded and Peripheral Devices hacking Read more

XRay Not Enabled
ISBN13 978-1789340617
Edition 3rd
Language English
File size 78.4 MB
Page Flip Enabled
Publisher Packt Publishing
Word Wise Not Enabled
Print length 833 pages
Accessibility Learn more
Screen Reader Supported
Publication date January 30, 2019
Enhanced typesetting Enabled

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Customer ratings & reviews

4.9 out of 5
★★★★★
70 ratings | 29 reviews
How item rating is calculated
View all reviews
5 stars
89% (62)
4 stars
1% (1)
3 stars
0% (0)
2 stars
0% (0)
1 star
10% (7)
Sort by

There are currently no written reviews for this product.