Intermediate Security Testing with Kali Linux 2

Titre : Intermediate Security Testing with Kali Linux 2
Auteur : Daniel W. Dieterle
Éditeur : CreateSpace
ISBN-13 : 1516945867
Libération : 2015-09-25

Télécharger Lire en ligne

Kali Linux 2 is the most advanced and feature rich penetration testing platform available. This hands-on learn by doing book will help take you beyond the basic features of Kali into a more advanced understanding of the tools and techniques used in security testing. If you have a basic understanding of Kali and want to learn more, or if you want to learn more advanced techniques, then this book is for you.Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find and correct security issues before the bad guys detect them. As a follow up to the popular "Basic Security Testing with Kali Linux" book, this work picks up where the first left off. Topics Include What is new in Kali 2? New Metasploit Features and Commands Creating Shells with Msfvenom Post Modules & Railgun PowerShell for Post Exploitation Web Application Pentesting How to use Burp Suite Security Testing Android Devices Forensics Tools for Security Testing Security Testing an Internet of Things (IoT) Device And much more!

Ethical Hacking and Penetration Testing Guide

Titre : Ethical Hacking and Penetration Testing Guide
Auteur : Rafay Baloch
Éditeur : CRC Press
ISBN-13 : 9781482231625
Libération : 2014-07-28

Télécharger Lire en ligne

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don’t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Basic Security Testing with Kali Linux

Titre : Basic Security Testing with Kali Linux
Auteur : Daniel W. Dieterle
Éditeur : CreateSpace
ISBN-13 : 1494861275
Libération : 2014-01-05

Télécharger Lire en ligne

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do. In "Basic Security Testing with Kali Linux", you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system. This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the "Hacker's Google") Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your Network Though no network can be completely "Hacker Proof", knowing how an attacker works will help put you on the right track of better securing your network. (Updated 12/2014 - All reported issues have been corrected including print issues, spelling issues & typos; also Veil install has been updated.)

Kali Linux Wireless Penetration Testing Beginner s Guide

Titre : Kali Linux Wireless Penetration Testing Beginner s Guide
Auteur : Cameron Buchanan
Éditeur :
ISBN-13 : 1783280417
Libération : 2015-03-30

Télécharger Lire en ligne

If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.


Titre : Rtfm
Auteur : Ben Clark
Éditeur :
ISBN-13 : 1494295504
Libération : 2014-02-11

Télécharger Lire en ligne

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Black Hat Python

Titre : Black Hat Python
Auteur : Justin Seitz
Éditeur : No Starch Press
ISBN-13 : 9781593275907
Libération : 2014-12-14

Télécharger Lire en ligne

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to: Create a trojan command-and-control using GitHubDetect sandboxing and automate com­mon malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

The Hacker Playbook 2

Titre : The Hacker Playbook 2
Auteur : Peter Kim
Éditeur : CreateSpace
ISBN-13 : 1512214566
Libération : 2015-06-20

Télécharger Lire en ligne

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Programming for the Absolute Beginner

Titre : Programming for the Absolute Beginner
Auteur : Jerry Lee Jr. Ford
Éditeur : Cengage Learning
ISBN-13 : 9781598637564
Libération : 2007-01-01

Télécharger Lire en ligne

Want to learn computer programming but aren't sure where to start? Programming for the Absolute Beginner provides a gentle learning curve in programming for anyone who wants to develop fundamental programming skills and create computer programs. The prima

Foundations of Modern Networking

Titre : Foundations of Modern Networking
Auteur : William Stallings
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780134176024
Libération : 2015-10-27

Télécharger Lire en ligne

Foundations of Modern Networking is a comprehensive, unified survey of modern networking technology and applications for today’s professionals, managers, and students. Dr. William Stallings offers clear and well-organized coverage of five key technologies that are transforming networks: Software-Defined Networks (SDN), Network Functions Virtualization (NFV), Quality of Experience (QoE), the Internet of Things (IoT), and cloudbased services. Dr. Stallings reviews current network ecosystems and the challenges they face–from Big Data and mobility to security and complexity. Next, he offers complete, self-contained coverage of each new set of technologies: how they work, how they are architected, and how they can be applied to solve real problems. Dr. Stallings presents a chapter-length analysis of emerging security issues in modern networks. He concludes with an up-to date discussion of networking careers, including important recent changes in roles and skill requirements. Coverage: Elements of the modern networking ecosystem: technologies, architecture, services, and applications Evolving requirements of current network environments SDN: concepts, rationale, applications, and standards across data, control, and application planes OpenFlow, OpenDaylight, and other key SDN technologies Network functions virtualization: concepts, technology, applications, and software defined infrastructure Ensuring customer Quality of Experience (QoE) with interactive video and multimedia network traffic Cloud networking: services, deployment models, architecture, and linkages to SDN and NFV IoT and fog computing in depth: key components of IoT-enabled devices, model architectures, and example implementations Securing SDN, NFV, cloud, and IoT environments Career preparation and ongoing education for tomorrow’s networking careers Key Features: Strong coverage of unifying principles and practical techniques More than a hundred figures that clarify key concepts Web support at QR codes throughout, linking to the website and other resources Keyword/acronym lists, recommended readings, and glossary Margin note definitions of key words throughout the text

Nmap Network Scanning

Titre : Nmap Network Scanning
Auteur : Gordon Lyon
Éditeur : Nmap Project
ISBN-13 : 0979958717
Libération : 2008-01

Télécharger Lire en ligne

The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits all levels of security and networking professionals.