Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Kali Linux: Assuring Security by Penetration Testing
🌠 Top Free Web Programming Books - 100% Free or Open Source!
  • Title: Kali Linux: Assuring Security by Penetration Testing
  • Author(s) Shiva V. N Parasram, et al
  • Publisher: Packt Publishing; 4th edition (October 26, 2018); eBook (Free Edition)
  • Permission: Free eBook by the Publisher (Packt)
  • Paperback: 528 pages
  • eBook: PDF
  • Language: English
  • ISBN-10/ASIN: 1789341760
  • ISBN-13: 978-1789341768
  • Share This:  

Book Description

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.

This book starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools.

As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.

By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.

About the Authors
  • Shiva V. N Parasram is the director of the Computer Forensics and Security Institute and is a cyber security trainer, pentester, and forensic investigator with 14 years in the field.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Kali Linux Revealed: Mastering the Penetration Testing Distribution

    Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure, and enterprise-ready.

  • UNIX System Security: A Guide for Users & System Administrators

    This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.

  • The SELinux Notebook, 4th Edition (Richard Haines)

    If you want an effective means of securing your Linux system (and who doesn't?), this book provides the means. The 4th edition covers the integration of SELinux within Android.

  • Securing & Optimizing Linux: A Hands on Guide

    This book shows you how to build a secure, reliable and clean network from the ground up, with optimizations and security, using RedHat Linux as a base OS. It presents everyhting you need to know clearly, concisely, and extreemly well organized.

  • O'Reilly® Network Security Tools (Justin Clarke, et al)

    This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.

  • Learn Ethical Hacking from Scratch (Zaid Sabih)

    You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices.

  • Next-Generation Firewalls For Dummies (Palo Alto Networks)

    This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Security+ Essentials (Neil Smyth)

    This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

  • Open Source Security Tools: A Practical Guide to Security Apps

    This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

Book Categories
:
Other Categories
Resources and Links