Plus d’un million de livres à portée de main !
Bookbot

Kali Linux Intrusion and Exploitation

Paramètres

  • 576pages
  • 21 heures de lecture

En savoir plus sur le livre

Over 70 recipes for system administrators and DevOps professionals to master Kali Linux 2 and conduct effective security assessments. This resource enables users to set up a penetration testing lab for preliminary assessments of attack surfaces and running exploits. It enhances testing efficiency through automated vulnerability scanners. Step-by-step recipes guide users in detecting various vulnerabilities, exploiting them to analyze consequences, and identifying security anomalies. Targeted at those interested in information security, this book is particularly beneficial for system administrators and architects aiming to secure their infrastructure. It serves both beginners and intermediates as a reference and a source of in-depth knowledge. Readers will learn the significance of security assessments beyond mere system management, familiarize themselves with tools like OPENVAS for locating vulnerabilities, discover privilege escalation methods on compromised machines, and identify security anomalies to fortify their infrastructure. Skills to prevent vulnerabilities and exploit complex setups using Metasploit are also covered. With rising threats to critical infrastructure, this practical guide helps users leverage Kali Linux 2.0 to identify known vulnerabilities and protect against unknown ones. Organized in three phases—information gathering, vulnerability assessment, and penetration testing—it serves as an ideal refere

Achat du livre

Kali Linux Intrusion and Exploitation, Dhruv Shah, Ishan Girdhar

Langue
Année de publication
2017
product-detail.submit-box.info.binding
(souple)
Nous vous informerons par e-mail dès que nous l’aurons retrouvé.

Modes de paiement

Personne n'a encore évalué .Évaluer