HOME > 상세정보

상세정보

Learning Kali Linux : security testing, penetration testing, and ethical hacking

Learning Kali Linux : security testing, penetration testing, and ethical hacking

자료유형
단행본
개인저자
Messier, Ric.
서명 / 저자사항
Learning Kali Linux : security testing, penetration testing, and ethical hacking / Ric Messier.
발행사항
Sebastopol :   O'Reilly Media,   c2018.  
형태사항
xv, 383 p. : ill. ; 24 cm.
ISBN
9781492028697 (pbk.)
서지주기
Includes bibliographical references and index.
일반주제명
Penetration testing (Computer security). Computer networks --Security measures. Hacking.
000 00000nam u2200205 a 4500
001 000045978015
005 20190401143115
008 190329s2018 caua b 001 0 eng d
020 ▼a 9781492028697 (pbk.)
040 ▼a 211009 ▼c 211009 ▼d 211009
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b M585L
100 1 ▼a Messier, Ric.
245 1 0 ▼a Learning Kali Linux : ▼b security testing, penetration testing, and ethical hacking / ▼c Ric Messier.
260 ▼a Sebastopol : ▼b O'Reilly Media, ▼c c2018.
300 ▼a xv, 383 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references and index.
630 0 0 ▼a Kali Linux.
650 0 ▼a Penetration testing (Computer security).
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Hacking.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 M585L 등록번호 121248411 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali? s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You? ll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You? ll discover different techniques for extending Kali tools and creating your own toolset.

  • Learn tools for stress testing network stacks and applications
  • Perform network reconnaissance to determine what? s available to attackers
  • Execute penetration tests using automated exploit tools such as Metasploit
  • Use cracking tools to see if passwords meet complexity requirements
  • Test wireless capabilities by injecting frames and cracking passwords
  • Assess web application vulnerabilities with automated or proxy-based tools
  • Create advanced attack techniques by extending Kali tools or developing your own
  • Use Kali Linux to generate reports once testing is complete



정보제공 : Aladin

목차

Intro -- Copyright -- Table of Contents -- Preface -- What This Book Covers -- Who This Book Is For -- The Value and Importance of Ethics -- Conventions Used in This Book -- Using Code Examples -- O’Reilly Safari -- How to Contact Us -- Acknowledgments -- Chapter 1. Foundations of Kali Linux -- Heritage of Linux -- About Linux -- Acquiring and Installing Kali Linux -- Desktops -- GNOME Desktop -- Logging In Through the Desktop Manager -- Xfce Desktop -- Cinnamon and MATE -- Using the Command Line -- File and Directory Management -- Process Management -- Other Utilities -- User Management -- Service Management -- Package Management -- Log Management -- Summary -- Useful Resources -- Chapter 2. Network Security Testing Basics -- Security Testing -- Network Security Testing -- Monitoring -- Layers -- Stress Testing -- Denial-of-Service Tools -- Encryption Testing -- Packet Captures -- Using tcpdump -- Berkeley Packet Filters -- Wireshark -- Poisoning Attacks -- ARP Spoofing -- DNS Spoofing -- Summary -- Useful Resources -- Chapter 3. Reconnaissance -- What Is Reconnaissance? -- Open Source Intelligence -- Google Hacking -- Automating Information Grabbing -- Recon-NG -- Maltego -- DNS Reconnaissance and whois -- DNS Reconnaissance -- Regional Internet Registries -- Passive Reconnaissance -- Port Scanning -- TCP Scanning -- UDP Scanning -- Port Scanning with Nmap -- High-Speed Scanning -- Service Scanning -- Manual Interaction -- Summary -- Useful Resources -- Chapter 4. Looking for Vulnerabilities -- Understanding Vulnerabilities -- Vulnerability Types -- Buffer Overflow -- Race Condition -- Input Validation -- Access Control -- Local Vulnerabilities -- Using lynis for Local Checks -- OpenVAS Local Scanning -- Root Kits -- Remote Vulnerabilities -- Quick Start with OpenVAS -- Creating a Scan -- OpenVAS Reports -- Network Device Vulnerabilities -- Auditing Devices -- Database Vulnerabilities -- Identifying New Vulnerabilities -- Summary -- Useful Resources -- Chapter 5. Automated Exploits -- What Is an Exploit? -- Cisco Attacks -- Management Protocols -- Other Devices -- Exploit Database -- Metasploit -- Starting with Metasploit -- Working with Metasploit Modules -- Importing Data -- Exploiting Systems -- Armitage -- Social Engineering -- Summary -- Useful Resources -- Chapter 6. Owning Metasploit -- Scanning for Targets -- Port Scanning -- SMB Scanning -- Vulnerability Scans -- Exploiting Your Target -- Using Meterpreter -- Meterpreter Basics -- User Information -- Process Manipulation -- Privilege Escalation -- Pivoting to Other Networks -- Maintaining Access -- Summary -- Useful Resources -- Chapter 7. Wireless Security Testing -- The Scope of Wireless -- 802.11 -- Bluetooth -- Zigbee -- WiFi Attacks and Testing Tools -- 802.11 Terminology and Functioning -- Identifying Networks -- WPS Attacks -- Automating Multiple Tests -- Injection Attacks -- Password Cracking on WiFi -- besside-ng -- coWPAtty -- Aircrack-ng -- Fern -- Going Rogue -- Hosting an Access Point -- Phishing Users -- Wireless Honeypot -- Bluetooth Testing -- Scanning -- Service Identification -- Other Bluetooth Testing -- Zigbee Testing -- Summary -- Useful Resources -- Chapter 8. Web Application Testing -- Web Architecture -- Firewall -- Load Balancer -- Web Server -- Application Server -- Database Server -- Web-Based Attacks -- SQL Injection -- XML Entity Injection -- Command Injection -- Cross-Site Scripting -- Cross-Site Request Forgery -- Session Hijacking -- Using Proxies -- Burp Suite -- Zed Attack Proxy -- WebScarab -- Paros Proxy -- Proxystrike -- Automated Web Attacks -- Recon -- Vega -- nikto -- dirbuster and gobuster -- Java-Based Application Servers -- SQL-Based Attacks -- Assorted Tasks -- Summary -- Useful Resources -- Chapter 9. Cracking Passwords -- Password Storage -- Security Account Manager -- PAM and Crypt -- Acquiring Passwords -- Local Cracking -- John the Ripper -- Rainbow Tables -- HashCat -- Remote Cracking -- Hydra -- Patator -- Web-Based Cracking -- Summary -- Useful Resources -- Chapter 10. Advanced Techniques and Concepts -- Programming Basics -- Compiled Languages -- Interpreted Languages -- Intermediate Languages -- Compiling and Building -- Programming Errors -- Buffer Overflows -- Heap Overflows -- Return to libc -- Writing Nmap Modules -- Extending Metasploit -- Disassembling and Reverse Engineering -- Debugging -- Disassembling -- Tracing Programs -- Other File Types -- Maintaining Access and Cleanup -- Metasploit and Cleanup -- Maintaining Access -- Summary -- Useful Resources -- Chapter 11. Reporting -- Determining Threat Potential and Severity -- Writing Reports -- Audience -- Executive Summary -- Methodology -- Findings -- Taking Notes -- Text Editors -- GUI-Based Editors -- Notes -- Capturing Data -- Organizing Your Data -- Dradis Framework -- CaseFile -- Summary -- Useful Resources -- Index -- About the Author -- Colophon -- .

관련분야 신착자료

Harvard Business Review (2025)