The Ultimate Kali Linux Book : Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire, 2/e (Paperback)

Glen D. Singh

買這商品的人也買了...

相關主題

商品描述

Key Features

  • Learn to compromise enterprise networks with Kali Linux
  • Gain comprehensive insights into security concepts using advanced real-life hacker techniques
  • Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment

Book Description

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.

This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment.

By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.

What you will learn

  • Explore the fundamentals of ethical hacking
  • Understand how to install and configure Kali Linux
  • Perform asset and network discovery techniques
  • Focus on how to perform vulnerability assessments
  • Exploit the trust in Active Directory domain services
  • Perform advanced exploitation with Command and Control (C2) techniques
  • Implement advanced wireless hacking techniques
  • Become well-versed with exploiting vulnerable web applications

Who this book is for

This pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.

 

商品描述(中文翻譯)

主要特點


  • 學習使用Kali Linux來入侵企業網絡

  • 透過高級的真實黑客技術深入了解安全概念

  • 像道德黑客和滲透測試人員一樣使用Kali Linux來掌控環境

書籍描述

Kali Linux是在網絡安全行業中最受歡迎且最先進的滲透測試Linux發行版。使用Kali Linux,網絡安全專業人員能夠發現和利用各種漏洞,並對企業有線和無線網絡進行高級滲透測試。

本書是一本針對Kali Linux和滲透測試的全面指南,將讓您迅速掌握相關知識。通過真實場景,您將了解如何建立實驗室並探索核心滲透測試概念。在本書中,您將專注於信息收集,並了解Kali Linux中捆綁的不同漏洞評估工具。您將學習在網絡上發現目標系統,識別設備上的安全漏洞,利用安全弱點並獲取對網絡的訪問權限,建立命令和控制(C2)操作,以及進行Web應用滲透測試。在這本更新的第二版中,您將能夠入侵Active Directory並利用企業網絡。最後,本書還介紹了在高度安全環境中執行複雜Web滲透測試技術的最佳實踐。

通過閱讀本書,您將掌握使用Kali Linux在企業網絡上進行高級滲透測試的技能。

您將學到什麼


  • 探索道德黑客的基礎知識

  • 了解如何安裝和配置Kali Linux

  • 執行資產和網絡發現技術

  • 專注於漏洞評估的執行

  • 利用Active Directory域服務中的信任

  • 使用命令和控制(C2)技術進行高級入侵

  • 實施高級無線入侵技術

  • 熟悉利用易受攻擊的Web應用程序

適合閱讀對象

本書適合學生、培訓師、網絡安全專業人員、網絡安全愛好者、網絡安全專業人員、道德黑客、滲透測試人員和安全工程師。如果您沒有任何先備知識,並且希望成為使用Kali Linux操作系統(OS)進行滲透測試的專家,那麼本書適合您。

目錄大綱

Table of Contents

  1. Introduction to Ethical Hacking
  2. Building a Penetration Testing Lab
  3. Setting Up for Advanced Hacking Techniques
  4. Reconnaissance and Footprinting
  5. Exploring Active Information Gathering
  6. Performing Vulnerability Assessments
  7. Understanding Network Penetration Testing
  8. Performing Network Penetration Testing
  9. Advanced Network Penetration Testing – Post Exploitation
  10. Working with Active Directory Attacks
  11. Advanced Active Directory Attacks
  12. Delving into Command and Control Tactics
  13. Advanced Wireless Penetration Testing
  14. Performing Client-Side Attacks - Social Engineering
  15. Understanding Website Application Security
  16. Advanced Website Penetration Testing
  17. Best Practices for the Real World

目錄大綱(中文翻譯)

目錄

1. 道德駭客入門
2. 建立滲透測試實驗室
3. 設置進階駭客技術
4. 偵查和足跡追蹤
5. 探索主動資訊收集
6. 執行弱點評估
7. 瞭解網路滲透測試
8. 執行網路滲透測試
9. 進階網路滲透測試 - 後續利用
10. 使用Active Directory進行攻擊
11. 進階Active Directory攻擊
12. 深入研究指揮和控制策略
13. 進階無線網路滲透測試
14. 執行用戶端攻擊 - 社交工程
15. 瞭解網站應用程式安全性
16. 進階網站滲透測試
17. 實務中的最佳做法