Показать сокращенную информацию
| dc.contributor.author | Sharma Himanshu | |
| dc.date.accessioned | 2024-01-29T22:10:08Z | |
| dc.date.available | 2024-01-29T22:10:08Z | |
| dc.date.issued | 2019 | |
| dc.identifier.citation | Sharma. Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing: Second edition. - 1 online resource : - URL: https://libweb.kpfu.ru/ebsco/pdf/2094781.pdf | |
| dc.identifier.isbn | 9781789953701 | |
| dc.identifier.isbn | 1789953707 | |
| dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180360 | |
| dc.description | Previous edition published: 2017. | |
| dc.description | Includes bibliographical references. | |
| dc.description.abstract | With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities. | |
| dc.description.tableofcontents | Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Kali -- An Introduction; Configuring Kali Linux; Getting ready; How to do it...; How it works...; Configuring the Xfce environment; How to do it...; Configuring the MATE environment; How to do it...; Configuring the LXDE environment; How to do it...; Configuring the E17 environment; How to do it...; Configuring the KDE environment; How to do it...; Prepping with custom tools; Getting ready; How to do it...; Aquatone; Subfinder; There's more...; Zone Walking using DNSRecon; Getting ready | |
| dc.description.tableofcontents | How to do it...There's more...; Setting up I2P for anonymity; How to do it...; There's more...; Pentesting VPN's ike-scan; Getting ready; How to do it...; Cracking the PSK; There's more...; Setting up proxychains; How to do it...; Using proxychains with Tor; Going on a hunt with Routerhunter; Getting ready; How to do it...; Chapter 2: Gathering Intel and Planning Attack Strategies; Getting a list of subdomains; How to do it...; Using Shodan for fun and profit; Getting ready; How to do it...; Shodan Honeyscore; How to do it...; Shodan plugins; How to do it...; Censys; How to do it...; See also | |
| dc.description.tableofcontents | Using Nmap to find open portsHow to do it...; Using scripts; See also; Bypassing firewalls with Nmap; How to do it...; TCP ACK scan (-sA); TCP Window scan (-sW); Idle scan; How it works...; Searching for open directories using GoBuster; How to do it...; Hunting for SSL flaws; How to do it...; See also; Automating brute force with BruteSpray; How to do it...; Digging deep with TheHarvester; How to do it...; How it works...; Finding technology behind webapps using WhatWeb; How to do it...; Scanning IPs with masscan; How to do it...; Finding origin servers with CloudBunny; How to do it... | |
| dc.description.tableofcontents | Sniffing around with KismetHow to do it...; See also; Testing routers with Firewalk; How to do it...; How it works...; Chapter 3: Vulnerability Assessment -- Poking for Holes; Using the infamous Burp; How to do it...; Exploiting WSDLs with Wsdler; How to do it...; Using Intruder; How to do it...; Using golismero; How to do it...; See also; Exploring Searchsploit; How to do it...; Exploiting routers with routersploit; Getting ready; How to do it...; Using Metasploit; How to do it...; Automating Metasploit; How to do it...; Writing a custom resource script; How to do it...; See also | |
| dc.description.tableofcontents | Setting up a database in MetasploitHow to do it...; Generating payloads with MSFPC; How to do it...; Emulating threats with Cobalt Strike; Getting ready; How to do it...; There's more...; Chapter 4: Web App Exploitation -- Beyond OWASP Top 10; Exploiting XSS with XSS Validator; Getting ready; How to do it...; Injection attacks with sqlmap; How to do it...; See also; Owning all .svn and .git repositories; How to do it...; Winning race conditions; How to do it...; See also; Exploiting XXEs; How to do it...; See also; Exploiting Jboss with JexBoss; How to do it...; Exploiting PHP Object Injection | |
| dc.language | English | |
| dc.language.iso | en | |
| dc.subject.other | Penetration testing (Computer security) | |
| dc.subject.other | Computer security. | |
| dc.subject.other | Computers -- Access control. | |
| dc.subject.other | Computer networks -- Security measures. | |
| dc.subject.other | Computer networks -- Security measures. | |
| dc.subject.other | Computer security. | |
| dc.subject.other | Computers -- Access control. | |
| dc.subject.other | Penetration testing (Computer security) | |
| dc.subject.other | COMPUTERS / Security / General. | |
| dc.subject.other | COMPUTERS / Networking / Security. | |
| dc.subject.other | COMPUTERS / Security / Online Safety & Privacy. | |
| dc.subject.other | Electronic books. | |
| dc.title | Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing/ Himanshu Sharma. | |
| dc.type | Book | |
| dc.description.pages | 1 online resource : | |
| dc.collection | Электронно-библиотечные системы | |
| dc.source.id | EN05CEBSCO05C1378 |