Brand Waali Quality, Bazaar Waali Deal!
Impact@Snapdeal
Help Center
Sell On Snapdeal
Download App
Cart
Sign In

Sorry! Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking is sold out.

Compare Products
Clear All
Let's Compare!

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

This product has been sold out

pay
Rs  1,050
We will let you know when in stock
notify me

Featured

Highlights

  • ISBN13:9789352137527
  • ISBN10:9352137523
  • Publisher:Shroff Publishers & Distributors Pvt. Ltd.
  • Language:English
  • Author:Ric Messier
  • Binding:Paperback
  • Publishing Year:2018
  • Pages:404
  • Edition Details:First
  • SUPC: SDL679095015

Other Specifications

Other Details
Country of Origin or Manufacture or Assembly India
Common or Generic Name of the commodity Programming Languages Books
Manufacturer's Name & Address
Packer's Name & Address
Marketer's Name & Address
Importer's Name & Address

Description

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

\nAuthor Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.\n

    \n
  • Learn tools for stress testing network stacks and applications
  • \n
  • Perform network reconnaissance to determine what’s available to attackers
  • \n
  • Execute penetration tests using automated exploit tools such as Metasploit
  • \n
  • Use cracking tools to see if passwords meet complexity requirements
  • \n
  • Test wireless capabilities by injecting frames and cracking passwords
  • \n
  • Assess web application vulnerabilities with automated or proxy-based tools
  • \n
  • Create advanced attack techniques by extending Kali tools or developing your own
  • \n
  • Use Kali Linux to generate reports once testing is complete
  • \n

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.

Seller Details

View Store


Expand your business to millions of customers