Kali Linux Intrusion and Exploitation Cookbook

$44.99 (as of June 21, 2018, 4:59 am) & FREE Shipping. Details

Usually ships in 24 hours

Category:

Description

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments

About This Book

  • Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits
  • Improve your testing efficiency with using automated vulnerability scanners
  • Work through step by step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies

Who This Book Is For

This book is intended for many who need to know more about information security. In particular, it’s ideal for system administrators and system architects who need to make certain that the infrastructure and systems they are creating and managing are protected. This book helps both beginners and intermediates by allowing them to use it as a reference book and to gain in-depth knowledge.

What You Will Learn

  • Understand the importance of security assessments over merely setting up and managing systems/processes
  • Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities
  • Discover a couple of solutions to escalate privileges on a compromised machine
  • Identify security anomalies with the intention to make your infrastructure protected and further fortify it
  • Acquire the skills to prevent infrastructure and application vulnerabilities
  • Exploit vulnerabilities that require a complex setup with the help of Metasploit

In Detail

With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to make sure

Additional information

Author

Binding

EAN

EANList

ISBN

ItemDimensions

Label

Languages

Manufacturer

NumberOfItems

NumberOfPages

PackageDimensions

ProductGroup

ProductTypeName

PublicationDate

Publisher

ReleaseDate

Studio

Bookmark the permalink.

Comments are closed.