More Information
Learn
  • Install Kali Linux on standalone or virtual machines
  • Understand the file structure of Kali Linux
  • Gather information and scanning using tools like Nmap
  • Undertake vulnerability assessments and penetration testing
  • Work with exploitation frameworks
  • Penetration testing with web applications
  • Break passwords, create backdoors, and rooting etc
  • Complete forensic analysis using Kali
About

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.

Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.

Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.

Features
  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Covers over 30 different tools included in Kali Linux
  • Easy guide to set up and install Kali Linux under different hardware sets
  • Step by step examples to get started with pen-testing tools
Page Count 68
Course Length 2 hours 2 minutes
ISBN 9781849695671
Date Of Publication 24 Oct 2013

Authors

Abhinav Singh

Abhinav Singh is a well-known information security researcher. He is the author of Metasploit Penetration Testing Cookbook (first and second editions) and Instant Wireshark Starter, by Packt. He is an active contributor to the security community—paper publications, articles, and blogs. His work has been quoted in several security and privacy magazines, and digital portals. He is a frequent speaker at eminent international conferences—Black Hat and RSA. His areas of expertise include malware research, reverse engineering, and cloud security.