Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Results Page:  Previous Next
Author Johansen, Gerard, author.

Title Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition / Gerard Johansen, Tedi Heriyanto, Lee Allen, Shakeel Ali.

Edition Third edition.
Publication Info. Birmingham, UK : Packt Publishing, 2016.
QR Code
Description 1 online resource (1 volume) : illustrations.
Series Community experience distilled
Community experience distilled.
Note Includes index.
Contents Cover ; Copyright; Credits; Disclaimer; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Beginning with Kali Linux ; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing kali on a virtual machine; Saving or Moving the Virtual Machine; Installing Kali on a USB disk; Configuring the Virtual Machine; VirtualBox Guest Additions; Setting up Networking; Setting up a wired connection.
Setting up a wireless connectionUpdating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology ; Types of penetration testing; Black box testing; White box testing; Gray box testing; Deciding on a test; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual; Key features and benefits of OSSTMM.
Information Systems Security Assessment FrameworkKey features and benefits of ISSAF; Open Web Application Security Project; Key features and benefits of OWASP; Web Application Security Consortium Threat Classification; Key features and benefits of WASC-TC; Penetration Testing Execution Standard; Key features and benefits of PTES; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics.
SimplyEmailMetagoofil; Accessing leaked information; The Onion Router; Installing the TOR Browser; Summary; Chapter 5: Target Discovery ; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target ; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; The network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification.
Summary Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester.
Subject Kali Linux.
Kali Linux
Computer security.
Computers -- Access control.
Computer Security
Sécurité informatique.
Ordinateurs -- Accès -- Contrôle.
Computer security
Computers -- Access control
Added Author Heriyanto, Tedi, author.
Allen, Lee (Information security specialist), author.
Ali, Shakeel, author.
ISBN 9781785886065
1785886061
1785888420
9781785888427
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information