Kirjojen hintavertailu. Mukana 12 083 983 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

601 tulosta hakusanalla Kali Muscle

Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

Jilumudi Raghu Ram; Brian Sak

Packt Publishing Limited
2016
nidottu
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book • Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks • Perform advanced wireless assessment and penetration tests • Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali Linux Who This Book Is For If you are an intermediate-level wireless security consultant in Kali Linux and want to be the go-to person for Kali Linux wireless security in your organisation, then this is the book for you. Basic understanding of the core Kali Linux concepts is expected. What You Will Learn • Fingerprint wireless networks with the various tools available in Kali Linux • Learn various techniques to exploit wireless access points using CSRF • Crack WPA/WPA2/WPS and crack wireless encryption using Rainbow tables more quickly • Perform man-in-the-middle attack on wireless clients • Understand client-side attacks, browser exploits, Java vulnerabilities, and social engineering • Develop advanced sniffing and PCAP analysis skills to extract sensitive information such as DOC, XLS, and PDF documents from wireless networks • Use Raspberry PI and OpenWrt to perform advanced wireless attacks • Perform a DOS test using various techniques and tools In Detail Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. You will begin by gaining an understanding of setting up and optimizing your penetration testing environment for wireless assessments. Then, the book will take you through a typical assessment from reconnaissance, information gathering, and scanning the network through exploitation and data extraction from your target. You will get to know various ways to compromise the wireless network using browser exploits, vulnerabilities in firmware, web-based attacks, client-side exploits, and many other hacking methods. You will also discover how to crack wireless networks with speed, perform man-in-the-middle and DOS attacks, and use Raspberry Pi and Android to expand your assessment methodology. By the end of this book, you will have mastered using Kali Linux for wireless security assessments and become a more effective penetration tester and consultant. Style and approach This book uses a step-by-step approach using real-world attack scenarios to help you master the wireless penetration testing techniques.
Mastering Kali Linux for Advanced Penetration Testing -

Mastering Kali Linux for Advanced Penetration Testing -

Vijay Kumar Velu

Packt Publishing Limited
2017
nidottu
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn • Select and configure the most effective tools from Kali Linux to test network security • Employ stealth to avoid detection in the network being tested • Recognize when stealth attacks are being used against your network • Exploit networks and data systems using wired and wireless networks as well as web services • Identify and download valuable data from target systems • Maintain access to compromised systems • Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media. You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing Style and approach An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Vijay Kumar Velu; Robert Beggs

Packt Publishing Limited
2019
nidottu
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackersKey FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systemsDiscover various stealth techniques to remain undetected and defeat modern infrastructuresExplore red teaming techniques to exploit secured environmentBook DescriptionThis book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices. Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.What you will learnConfigure the most effective Kali Linux tools to test infrastructure securityEmploy stealth to avoid detection in the infrastructure being testedRecognize when stealth attacks are being used against your infrastructureExploit networks and data systems using wired and wireless networks as well as web servicesIdentify and download valuable data from target systemsMaintain access to compromised systemsUse social engineering to compromise the weakest part of the network - the end usersWho this book is forThis third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, IT professional, or security consultant wanting to maximize the success of your infrastructure testing using some of the advanced features of Kali Linux. Prior exposure of penetration testing and ethical hacking basics will be helpful in making the most out of this book.
Learn Kali Linux 2019

Learn Kali Linux 2019

Glen D. Singh

Packt Publishing Limited
2019
nidottu
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacksLearn to use Linux commands in the way ethical hackers do to gain control of your environmentBook DescriptionThe current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects.Through real-world examples, you’ll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you’ll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you’ll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You’ll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment.By the end of this book, you’ll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity.What you will learnExplore the fundamentals of ethical hackingLearn how to install and configure Kali LinuxGet up to speed with performing wireless network pentestingGain insights into passive and active information gatheringUnderstand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attackWho this book is forIf you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you’re simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.
Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Vijay Kumar Velu

PACKT PUBLISHING LIMITED
2022
nidottu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your infrastructureUse OSINT, Google dorks, Nmap, recon-nag, and other tools for passive and active reconnaissanceLearn about the latest email, Wi-Fi, and mobile-based phishing techniquesBook DescriptionRemote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances.This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lateral movement, privilege escalation, and command and control (C2) on compromised systems.By the end of this book, you'll have explored many advanced pentesting approaches and hacking techniques employed on networks, IoT, embedded peripheral devices, and radio frequencies.What you will learnExploit networks using wired/wireless networks, cloud infrastructure, and web servicesLearn embedded peripheral device, Bluetooth, RFID, and IoT hacking techniquesMaster the art of bypassing traditional antivirus and endpoint detection and response (EDR) toolsTest for data system exploits using Metasploit, PowerShell Empire, and CrackMapExecPerform cloud security vulnerability assessment and exploitation of security misconfigurationsUse bettercap and Wireshark for network sniffingImplement complex attacks with Metasploit, Burp Suite, and OWASP ZAPWho this book is forThis fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.
The Kali Project

The Kali Project

Indie Blue Publishing LLC
2021
pokkari
Kali represents the perfect metaphor of the great dissenter desperately needed in today's times, to rise above subjugate society. Kali, a goddess of strength and destruction, represents energy in its purest and feral form. Goddess Kali is an embodiment of the unfettered, and uncontrolled energy, who like nature, can create and destroy with equal ease. She is the perfect feminist icon the world needs today. "The Kali Project draws in the voices of women as women - teachers, mental health workers, writers, doctors, lawyers, bankers, social workers - adding a sharper understanding of the inner realities that patriarchal structures seek to silence, sanctified by society, religion, community, and class. With entries from children and teenagers, to poems by internationally well-known writers, the gamut of experiences is vast and reiterates the idea that art and poetry are the essential vehicles which carry the hurt and, in the process, also healing within them."-Charanjeet Kaur, Former Chief Editor and Features Editor of Muse India, currently Contributory Editor for Indian writing in English of MI. Consultant Editor of SPARROW (Sound & Picture Archives for Research On Women) Newsletter.
Paroles kali'na

Paroles kali'na

Thomas Appolinaire; Félix Tiouka; Jean-Ugo Pandolfi-Crozier

Books on Demand
2017
pokkari
D'en France, les paroles am rindiennes kali'na interpellent tout citoyen. Avec le droit des peuples autochtones, elles affirment depuis bient t quatre d cennies une mani re autre de concevoir les rapports entre l' tre humain et son environnement, l'homme et la politique, la nature et l'histoire.
Volki Kali

Volki Kali

Stephen King

Ast
2020
sidottu
Stranstvie Rolanda Diskejna i ego druzej prodolzhaetsja... I teper na puti ikh lezhit malenkij gorodok Kalja Brin Sterdzhis, zhiteli kotorogo raz v pokolenie platjat strashnuju dan poslannikam Tmy - Volkam Kali! Chitajte pjatuju knigu legendarnogo seriala "Temnaja Bashnja"! Literaturno-khudozhestvennoe izdanie.
Volki Kali

Volki Kali

Stephen King

Ast
2022
sidottu
Stranstvie Rolanda Diskejna i ego druzej prodolzhaetsja... I teper na puti ikh lezhit malenkij gorodok Kalja Brin Sterdzhis, zhiteli kotorogo raz v pokolenie platjat STRASHNUJu DAN poslannikam Tmy - Volkam Kali! Chitajte PJATUJu KNIGU legendarnogo seriala "Temnaja Bashnja"!
Volki Kali: iz tsikla "Temnaja Bashnja"
Tsikl "Temnaja Bashnja" - eto opus magnum - luchshaja rabota - Stivena Kinga. Istorija poslednego strelka Rolanda Diskejna i ego druzej.Proizvedenija, vkhodjaschie v etot tsikl, ne raz javljalis nominantami premii Brema Stokera. U "Temnoj Bashni" sotni tysjach fanatov i desjatki fan-klubov, ej posvjascheno mnozhestvo knig i statej.Stranstvie Rolanda Diskejna i ego druzej prodolzhaetsja... I teper na puti ikh lezhit malenkij gorodok Kalja Brin Sterdzhis, zhiteli kotorogo raz v pokolenie platjat strashnuju dan poslannikam Tmy - Volkam Kali!
Volki Kali

Volki Kali

Stephen King

Ast
2024
sidottu
Stranstvie Rolanda Diskejna i ego druzej prodolzhaetsja... I teper na puti ikh lezhit malenkij gorodok Kalja Brin Sterdzhis, zhiteli kotorogo raz v pokolenie platjat STRASHNUJu DAN poslannikam Tmy - Volkam Kali! Chitajte PJATUJu KNIGU legendarnogo seriala "Temnaja Bashnja"!
Pesn Kali

Pesn Kali

Dan Simmons

Ast
2025
nidottu
Kalkutta. Drevnij gorod uchenykh, filosofov, muzykantov, khudozhnikov i poetov. Gorod tainstvennykh istorij i strannykh verovanij, sochetajuschij v sebe bozhestvennuju krasotu i otvratitelnoe urodstvo, vysotu dukha i nischetu obitatelej tesnykh nochlezhek, tonkie blagovonija i smrad mertvechiny. Zhurnalist Robert Luzak po zadaniju redaktsii otpravljaetsja v eto znamenitoe mesto, chtoby privezti v Ameriku rukopis poeta Dasa, uchenika legendarnogo Rabindranata Tagora. Obychnaja komandirovka oborachivaetsja cheredoj uzhasajuschikh proisshestvij...
In Kali's Country; Tales from Sunny India

In Kali's Country; Tales from Sunny India

Emily Churchill Thompson Sheets

Alpha Editions
2021
pokkari
In Kali's Country; Tales from Sunny India, a classic since it was first published. Has been considered important throughout the human history, and so that this work is never forgotten we have made efforts in its preservation by republishing this book in a modern format for present and future generations. This whole book has been reformatted, retyped and designed. These books are not made of scanned copies and hence the text is clear and readable.
In Kali's Country; Tales from Sunny India (Edition1)

In Kali's Country; Tales from Sunny India (Edition1)

Ann S Stephens

VIJ Books (India) Pty Ltd
2023
nidottu
Ce livre classique a t initialement publi il y a des d cennies sous le titre ""Malaeska The Indian Wife of the White Hunter"" . Il a maintenant t traduit par Writat en langue fran aise pour leurs lecteurs francophones. Chez Writat, nous sommes passionn s par la pr servation du patrimoine litt raire du pass . Nous avons traduit ce livre en fran ais afin que les g n rations pr sentes et futures puissent le lire et le conserver.
In Kali’s Country: Tales from Sunny India

In Kali’s Country: Tales from Sunny India

Emily Churchill Thompson Sheets

Lector House Llp
2024
nidottu
NEW PRINT WITH PROFESSIONAL TYPE-SET IN CONTRAST TO SCANNED PRINTS OFFERED BY OTHERS In Kali s Country: Tales From Sunny India This book is a result of an effort made by us towards making a contribution to the preservation and repair of original classic literature. In an attempt to preserve, improve and recreate the original content, we have worked towards: 1. Type-setting & Reformatting: The complete work has been re-designed via professional layout, formatting and type-setting tools to re-create the same edition with rich typography, graphics, high quality images, and table elements, giving our readers the feel of holding a fresh and newly reprinted and/or revised edition, as opposed to other scanned & printed (Optical Character Recognition - OCR) reproductions. 2. Correction of imperfections: As the work was re-created from the scratch, therefore, it was vetted to rectify certain conventional norms with regard to typographical mistakes, hyphenations, punctuations, blurred images, missing content/pages, and/or other related subject matters, upon our consideration. Every attempt was made to rectify the imperfections related to omitted constructs in the original edition via other references. However, a few of such imperfections which could not be rectified due to intentional\unintentional omission of content in the original edition, were inherited and preserved from the original work to maintain the authenticity and construct, relevant to the work.