Kazan Federal University Digital Repository

Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing/ Himanshu Sharma.

Show simple item record

dc.contributor.author Sharma Himanshu
dc.date.accessioned 2024-01-29T22:10:08Z
dc.date.available 2024-01-29T22:10:08Z
dc.date.issued 2019
dc.identifier.citation Sharma. Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing: Second edition. - 1 online resource : - URL: https://libweb.kpfu.ru/ebsco/pdf/2094781.pdf
dc.identifier.isbn 9781789953701
dc.identifier.isbn 1789953707
dc.identifier.uri https://dspace.kpfu.ru/xmlui/handle/net/180360
dc.description Previous edition published: 2017.
dc.description Includes bibliographical references.
dc.description.abstract With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
dc.description.tableofcontents Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Kali -- An Introduction; Configuring Kali Linux; Getting ready; How to do it...; How it works...; Configuring the Xfce environment; How to do it...; Configuring the MATE environment; How to do it...; Configuring the LXDE environment; How to do it...; Configuring the E17 environment; How to do it...; Configuring the KDE environment; How to do it...; Prepping with custom tools; Getting ready; How to do it...; Aquatone; Subfinder; There's more...; Zone Walking using DNSRecon; Getting ready
dc.description.tableofcontents How to do it...There's more...; Setting up I2P for anonymity; How to do it...; There's more...; Pentesting VPN's ike-scan; Getting ready; How to do it...; Cracking the PSK; There's more...; Setting up proxychains; How to do it...; Using proxychains with Tor; Going on a hunt with Routerhunter; Getting ready; How to do it...; Chapter 2: Gathering Intel and Planning Attack Strategies; Getting a list of subdomains; How to do it...; Using Shodan for fun and profit; Getting ready; How to do it...; Shodan Honeyscore; How to do it...; Shodan plugins; How to do it...; Censys; How to do it...; See also
dc.description.tableofcontents Using Nmap to find open portsHow to do it...; Using scripts; See also; Bypassing firewalls with Nmap; How to do it...; TCP ACK scan (-sA); TCP Window scan (-sW); Idle scan; How it works...; Searching for open directories using GoBuster; How to do it...; Hunting for SSL flaws; How to do it...; See also; Automating brute force with BruteSpray; How to do it...; Digging deep with TheHarvester; How to do it...; How it works...; Finding technology behind webapps using WhatWeb; How to do it...; Scanning IPs with masscan; How to do it...; Finding origin servers with CloudBunny; How to do it...
dc.description.tableofcontents Sniffing around with KismetHow to do it...; See also; Testing routers with Firewalk; How to do it...; How it works...; Chapter 3: Vulnerability Assessment -- Poking for Holes; Using the infamous Burp; How to do it...; Exploiting WSDLs with Wsdler; How to do it...; Using Intruder; How to do it...; Using golismero; How to do it...; See also; Exploring Searchsploit; How to do it...; Exploiting routers with routersploit; Getting ready; How to do it...; Using Metasploit; How to do it...; Automating Metasploit; How to do it...; Writing a custom resource script; How to do it...; See also
dc.description.tableofcontents Setting up a database in MetasploitHow to do it...; Generating payloads with MSFPC; How to do it...; Emulating threats with Cobalt Strike; Getting ready; How to do it...; There's more...; Chapter 4: Web App Exploitation -- Beyond OWASP Top 10; Exploiting XSS with XSS Validator; Getting ready; How to do it...; Injection attacks with sqlmap; How to do it...; See also; Owning all .svn and .git repositories; How to do it...; Winning race conditions; How to do it...; See also; Exploiting XXEs; How to do it...; See also; Exploiting Jboss with JexBoss; How to do it...; Exploiting PHP Object Injection
dc.language English
dc.language.iso en
dc.subject.other Penetration testing (Computer security)
dc.subject.other Computer security.
dc.subject.other Computers -- Access control.
dc.subject.other Computer networks -- Security measures.
dc.subject.other Computer networks -- Security measures.
dc.subject.other Computer security.
dc.subject.other Computers -- Access control.
dc.subject.other Penetration testing (Computer security)
dc.subject.other COMPUTERS / Security / General.
dc.subject.other COMPUTERS / Networking / Security.
dc.subject.other COMPUTERS / Security / Online Safety & Privacy.
dc.subject.other Electronic books.
dc.title Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing/ Himanshu Sharma.
dc.type Book
dc.description.pages 1 online resource :
dc.collection Электронно-библиотечные системы
dc.source.id EN05CEBSCO05C1378


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account

Statistics