Corey P. Schultz – Författare
Visar alla böcker från författaren Corey P. Schultz. Handla med fri frakt och snabb leverans.
2 produkter
2 produkter
1 036 kr
Skickas inom 5-8 vardagar
Over 80 recipes to effectively test your network and boost your career in securityKey FeaturesLearn how to scan networks to find vulnerable computers and serversHack into devices to control them, steal their data, and make them yoursTarget wireless networks, databases, and web servers, and password cracking to make the most of Kali LinuxBook DescriptionKali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.What you will learnAcquire the key skills of ethical hacking to perform penetration testingLearn how to perform network reconnaissanceDiscover vulnerabilities in hostsAttack vulnerabilities to take control of workstations and serversUnderstand password cracking to bypass securityLearn how to hack into wireless networksAttack web and database servers to exfiltrate dataObfuscate your command and control connections to avoid firewall and IPS detectionWho this book is forIf you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux
Kali Linux Cookbook
Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark
Häftad, Engelska, 2025
557 kr
Skickas inom 5-8 vardagar
Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniquesDRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesInstall and configure Kali Linux on multiple platforms, choosing the best desktop and use casePerform expert network scanning and vulnerability analysis with Nmap, OpenVAS, and NessusAugment social engineering campaigns with AI chatbots for real-time, personalized engagementPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis hands-on guide will help you become a penetration testing expert by gaining command of the powerful tools of Kali Linux, from versions 2024.3 through 2025.1, aligned with the latest features introduced and applying them in real-world security assessments.This cookbook’s third edition is updated to include the latest advancements in cybersecurity. The author leverages their 20 years of industry experience to guide you through installing Kali on multiple platforms, setting up lab environments, and using modern tools, such as Nmap, Metasploit, Wireshark, OpenVAS, and AI-driven reconnaissance. You’ll also explore automated social engineering, wireless hacking, web and database exploitation, and advanced persistence techniques, delivering a comprehensive and up-to-date penetration testing resource. Recognizing the critical role of human factors in security, this edition expands on social engineering tactics, including psychological principles and AI-driven automation, to craft highly effective attack campaigns.By the end of this book, you’ll have strengthened your grasp of the entire penetration testing process, from environment setup and reconnaissance to vulnerability analysis, exploitation, and maintaining access, and be equipped with industry-standard tools to enhance your effectiveness as a security professional.What you will learnFind out how to scan the network to find vulnerable computers and serversUse AI-enhanced tools for thorough reconnaissance and intelligenceIdentify and exploit vulnerabilities with advanced penetration toolsApply social engineering tactics and advanced password crackingPerform wireless, web, and database penetration testing techniquesMaintain persistent access while avoiding detection and defensesWho this book is forThis book is ideal for cybersecurity professionals, ethical hackers, penetration testers, red teamers, security analysts, and IT administrators looking to strengthen their offensive security skills using Kali Linux. It is also for students, career-switchers, and aspiring ethical hackers preparing for roles in cybersecurity operations and threat analysis. A basic understanding of networking, operating systems, and security fundamentals is recommended.