Kirjojen hintavertailu. Mukana 11 469 877 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

584 tulosta hakusanalla Kali Muscle

Learning Kali Linux

Learning Kali Linux

Ric Messier

O'Reilly Media
2024
pokkari
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, the Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including deeper coverage of reverse engineering. Author Ric Messier, principal security consultant with Mandiant, also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. You'll also find review questions throughout the book to help you test your knowledge as you learn. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete
Learning Kali Linux

Learning Kali Linux

Oriyano Sean Philip

O'Reilly Media, Inc, USA
2019
nidottu
If you re looking to get into penetration testing and security, but find the gap between theory and practice too vast, this book is your bridge. Author Sean-Phillip Oriyano will discuss and demonstrate the skills, techniques, and knowledge required to build a good foundation for a successful future penetration tester.This book takes your existing understanding of networks, technology, and practices and helps you build a strong foundation of fundamentals, understanding, and practical skills that you can use to explore and push further into the field. Let this book be your guide and help you cross into the exciting and rewarding field of security."
Princess Kali

Princess Kali

Dorothy Felix

Createspace Independent Publishing Platform
2017
nidottu
From early on, children are looking to discover their place in the world and longing to understand how their personalities, traits, and talents fit in. The assurance that they are deeply loved and a unique creation in our big universe is certain to help them spread their wings and fly. Through playful, charming rhyme and vivid, fantastical illustrations, When God Made You inspires young readers to learn about their own special gifts and how they fit into God's divine plan as they grow, explore, and begin to create for themselves. When God made YOU, somehow God knew That the world needed someone exactly like you Do you know that you are fearfully and wonderfully made? This book will show you that.
Tantric Kali

Tantric Kali

Daniel Odier

Inner Traditions Bear and Company
2016
pokkari
According to traditions going back to pre-Vedic times, Kali sprang from the third eye of the Goddess Durga as a destructive and terrifying manifestation of feminine power sent to lay waste to the forces of evil. Throughout India to this day, Kali is worshipped as the destroyer of bondage, capable of liberating her devotee from all rules and subjugation. In The Tantric Kali, Daniel Odier presents the mythology, practices, and rituals of Kali worship in the Tantric Kaula tradition within Kashmiri Shaivism. He reveals the practices of Vamachara, commonly known as the Left-hand Path but more accurately translated as the Path of Shakti. In this tradition the body itself is Kali’s temple, and it is therefore unnecessary to reject or deny the body to know union with the divine. Instead, nothing is regarded as pure or impure and there is complete freedom from rules. Focused on working directly with forbidden emotions and behaviors, this path allows the seeker to transcend obstacles to liberation through sexual union. According to the Kaula Upanishad, “In your behavior do the opposite to what the norms dictate but remain in consciousness.” This is the essence of Tantra. Kali is absolute reality: manifested as woman intoxicated by desire, she frees the tantric practitioner from all desire except union with the divine.
In Kali's Country Tales from Sunny India

In Kali's Country Tales from Sunny India

Emily Churchill

Notion Press
2020
pokkari
Notion Press proudly brings to you timeless classics from ancient texts to popular modern classics. This carefully chosen collection of books is a celebration of literature, our tribute to the pioneers, the legends and the giants of the literary world.Apart from being the voice of indie writers, we also want to introduce every reader to read all kinds of literature.In this series, you will find a wide range of books--from popular classics like the works of Shakespeare and Charlotte Bront to rare gems by the likes of Edith Wharton and James Fenimore Cooper.
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs

Packt Publishing Limited
2014
nidottu
This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, and documentation of penetration testing by building on your understanding of Kali Linux and wireless concepts.
Mastering Kali Linux for Web Penetration Testing

Mastering Kali Linux for Web Penetration Testing

Michael McPhee

Packt Publishing Limited
2017
nidottu
Master the art of exploiting advanced web penetration techniques with Kali Linux 2016.2 About This Book • Make the most out of advanced web pen-testing techniques using Kali Linux 2016.2 • Explore how Stored (a.k.a. Persistent) XSS attacks work and how to take advantage of them • Learn to secure your application by performing advanced web based attacks. • Bypass internet security to traverse from the web to a private network. Who This Book Is For This book targets IT pen testers, security consultants, and ethical hackers who want to expand their knowledge and gain expertise on advanced web penetration techniques. Prior knowledge of penetration testing would be beneficial. What You Will Learn • Establish a fully-featured sandbox for test rehearsal and risk-free investigation of applications • Enlist open-source information to get a head-start on enumerating account credentials, mapping potential dependencies, and discovering unintended backdoors and exposed information • Map, scan, and spider web applications using nmap/zenmap, nikto, arachni, webscarab, w3af, and NetCat for more accurate characterization • Proxy web transactions through tools such as Burp Suite, OWASP's ZAP tool, and Vega to uncover application weaknesses and manipulate responses • Deploy SQL injection, cross-site scripting, Java vulnerabilities, and overflow attacks using Burp Suite, websploit, and SQLMap to test application robustness • Evaluate and test identity, authentication, and authorization schemes and sniff out weak cryptography before the black hats do In Detail You will start by delving into some common web application architectures in use, both in private and public cloud instances. You will also learn about the most common frameworks for testing, such as OWASP OGT version 4, and how to use them to guide your efforts. In the next section, you will be introduced to web pentesting with core tools and you will also see how to make web applications more secure through rigorous penetration tests using advanced features in open source tools. The book will then show you how to better hone your web pentesting skills in safe environments that can ensure low-risk experimentation with the powerful tools and features in Kali Linux that go beyond a typical script-kiddie approach. After establishing how to test these powerful tools safely, you will understand how to better identify vulnerabilities, position and deploy exploits, compromise authentication and authorization, and test the resilience and exposure applications possess. By the end of this book, you will be well-versed with the web service architecture to identify and evade various protection mechanisms that are used on the Web today. You will leave this book with a greater mastery of essential test techniques needed to verify the secure design, development, and operation of your customers' web applications. Style and approach An advanced-level guide filled with real-world examples that will help you take your web application's security to the next level by using Kali Linux 2016.2.
Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

Jilumudi Raghu Ram; Brian Sak

Packt Publishing Limited
2016
nidottu
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book • Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks • Perform advanced wireless assessment and penetration tests • Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali Linux Who This Book Is For If you are an intermediate-level wireless security consultant in Kali Linux and want to be the go-to person for Kali Linux wireless security in your organisation, then this is the book for you. Basic understanding of the core Kali Linux concepts is expected. What You Will Learn • Fingerprint wireless networks with the various tools available in Kali Linux • Learn various techniques to exploit wireless access points using CSRF • Crack WPA/WPA2/WPS and crack wireless encryption using Rainbow tables more quickly • Perform man-in-the-middle attack on wireless clients • Understand client-side attacks, browser exploits, Java vulnerabilities, and social engineering • Develop advanced sniffing and PCAP analysis skills to extract sensitive information such as DOC, XLS, and PDF documents from wireless networks • Use Raspberry PI and OpenWrt to perform advanced wireless attacks • Perform a DOS test using various techniques and tools In Detail Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. You will begin by gaining an understanding of setting up and optimizing your penetration testing environment for wireless assessments. Then, the book will take you through a typical assessment from reconnaissance, information gathering, and scanning the network through exploitation and data extraction from your target. You will get to know various ways to compromise the wireless network using browser exploits, vulnerabilities in firmware, web-based attacks, client-side exploits, and many other hacking methods. You will also discover how to crack wireless networks with speed, perform man-in-the-middle and DOS attacks, and use Raspberry Pi and Android to expand your assessment methodology. By the end of this book, you will have mastered using Kali Linux for wireless security assessments and become a more effective penetration tester and consultant. Style and approach This book uses a step-by-step approach using real-world attack scenarios to help you master the wireless penetration testing techniques.
Mastering Kali Linux for Advanced Penetration Testing -

Mastering Kali Linux for Advanced Penetration Testing -

Vijay Kumar Velu

Packt Publishing Limited
2017
nidottu
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn • Select and configure the most effective tools from Kali Linux to test network security • Employ stealth to avoid detection in the network being tested • Recognize when stealth attacks are being used against your network • Exploit networks and data systems using wired and wireless networks as well as web services • Identify and download valuable data from target systems • Maintain access to compromised systems • Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media. You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing Style and approach An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Vijay Kumar Velu; Robert Beggs

Packt Publishing Limited
2019
nidottu
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackersKey FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systemsDiscover various stealth techniques to remain undetected and defeat modern infrastructuresExplore red teaming techniques to exploit secured environmentBook DescriptionThis book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices. Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.What you will learnConfigure the most effective Kali Linux tools to test infrastructure securityEmploy stealth to avoid detection in the infrastructure being testedRecognize when stealth attacks are being used against your infrastructureExploit networks and data systems using wired and wireless networks as well as web servicesIdentify and download valuable data from target systemsMaintain access to compromised systemsUse social engineering to compromise the weakest part of the network - the end usersWho this book is forThis third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, IT professional, or security consultant wanting to maximize the success of your infrastructure testing using some of the advanced features of Kali Linux. Prior exposure of penetration testing and ethical hacking basics will be helpful in making the most out of this book.
Learn Kali Linux 2019

Learn Kali Linux 2019

Glen D. Singh

Packt Publishing Limited
2019
nidottu
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacksLearn to use Linux commands in the way ethical hackers do to gain control of your environmentBook DescriptionThe current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects.Through real-world examples, you’ll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you’ll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you’ll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You’ll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment.By the end of this book, you’ll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity.What you will learnExplore the fundamentals of ethical hackingLearn how to install and configure Kali LinuxGet up to speed with performing wireless network pentestingGain insights into passive and active information gatheringUnderstand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attackWho this book is forIf you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you’re simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Vijay Kumar Velu

PACKT PUBLISHING LIMITED
2022
nidottu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your infrastructureUse OSINT, Google dorks, Nmap, recon-nag, and other tools for passive and active reconnaissanceLearn about the latest email, Wi-Fi, and mobile-based phishing techniquesBook DescriptionRemote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances.This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lateral movement, privilege escalation, and command and control (C2) on compromised systems.By the end of this book, you'll have explored many advanced pentesting approaches and hacking techniques employed on networks, IoT, embedded peripheral devices, and radio frequencies.What you will learnExploit networks using wired/wireless networks, cloud infrastructure, and web servicesLearn embedded peripheral device, Bluetooth, RFID, and IoT hacking techniquesMaster the art of bypassing traditional antivirus and endpoint detection and response (EDR) toolsTest for data system exploits using Metasploit, PowerShell Empire, and CrackMapExecPerform cloud security vulnerability assessment and exploitation of security misconfigurationsUse bettercap and Wireshark for network sniffingImplement complex attacks with Metasploit, Burp Suite, and OWASP ZAPWho this book is forThis fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.
The Kali Project

The Kali Project

Indie Blue Publishing LLC
2021
pokkari
Kali represents the perfect metaphor of the great dissenter desperately needed in today's times, to rise above subjugate society. Kali, a goddess of strength and destruction, represents energy in its purest and feral form. Goddess Kali is an embodiment of the unfettered, and uncontrolled energy, who like nature, can create and destroy with equal ease. She is the perfect feminist icon the world needs today. "The Kali Project draws in the voices of women as women - teachers, mental health workers, writers, doctors, lawyers, bankers, social workers - adding a sharper understanding of the inner realities that patriarchal structures seek to silence, sanctified by society, religion, community, and class. With entries from children and teenagers, to poems by internationally well-known writers, the gamut of experiences is vast and reiterates the idea that art and poetry are the essential vehicles which carry the hurt and, in the process, also healing within them."-Charanjeet Kaur, Former Chief Editor and Features Editor of Muse India, currently Contributory Editor for Indian writing in English of MI. Consultant Editor of SPARROW (Sound & Picture Archives for Research On Women) Newsletter.
Paroles kali'na

Paroles kali'na

Thomas Appolinaire; Félix Tiouka; Jean-Ugo Pandolfi-Crozier

Books on Demand
2017
pokkari
D'en France, les paroles am rindiennes kali'na interpellent tout citoyen. Avec le droit des peuples autochtones, elles affirment depuis bient t quatre d cennies une mani re autre de concevoir les rapports entre l' tre humain et son environnement, l'homme et la politique, la nature et l'histoire.