Conduct realistic and effective security tests on your network with Kali Linux using Packt’s new book and eBook
Packt is pleased to announce the release of its new book Mastering Kali Linux for Advanced Penetration Testing, by Robert W. Beggs. This book provides readers with all the practical knowledge needed to test a network's security using a proven hacker's methodology. The book has 325 pages and is competitively priced at $49.99, while the eBook and Kindle versions are available for $25.49.
About the author:
Robert W. Beggs is the founder and CEO of Digital Defence. He is a strong evangelist of security and is a co-founder of Toronto Area Security Klatch, the largest known vendor-independent security user group in North America. He has more than 15 years of experience in the technical leadership of security engagements, including penetration testing wired and wireless networks, incident response, and data forensics.
Kali Linux is a GPL-compliant Linux distribution built for penetration testers, with a development staff consisting of individuals spanning different languages, regions, industries, and nationalities. The evolution of Kali took place over many years of development, penetration tests, and unprecedented help from the security community. Kali Linux is preinstalled with numerous penetration-testing programs, including nmap, Wireshark, John the Ripper, and Aircrack-ng.
Mastering Kali Linux for Advanced Penetration Testing helps readers learn the kill chain perspective in assessing network security—from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection. Readers will learn about reconnaissance, exploitation, and post-exploitation activities used by penetration testers, hackers.
Mastering Kali Linux for Advanced Penetration Testing covers the following topics:
Part 1: The Attacker's Kill Chain
Chapter 1: Starting with Kali Linux
Chapter 2: Identifying the Target – Passive Reconnaissance
Chapter 3: Active Reconnaissance and Vulnerability Scanning
Chapter 4: Exploit
Chapter 5: Post Exploit – Action on the Objective
Chapter 6: Post Exploit – Persistence
Part 2: The Delivery Phase
Chapter 7: Physical Attacks and Social Engineering
Chapter 8: Exploiting Wireless Communications
Chapter 9: Reconnaissance and Exploitation of Web-based Applications
Chapter 10: Exploiting Remote Access Communications
Chapter 11: Client-side Exploitation
Packt is one of the most prolific and fast-growing tech book publishers in the world. Originally focused on open source software, Packt books focus on practicality, recognizing that readers are ultimately concerned with getting the job done. Packt’s digitally-focused business model allows them to publish up-to-date books in very specific areas.
|Mastering Kali Linux for Advanced Penetration Testing|
|Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems
For more information, please visit: http://www.packtpub.com/mastering-kali-linux-for-advanced-penetration-testing/book