Get Free Shipping on orders over $89
Mastering Kali Linux for Advanced Penetration Testing : Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Vijay Kumar Velu

Mastering Kali Linux for Advanced Penetration Testing

Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite

By: Vijay Kumar Velu

eText | 22 August 2803 | Edition Number 4

Sorry, we are not able to source the ebook you are looking for right now.

We did a search for other ebooks with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your ebook.

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniques

Key Features

  • Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systems
  • Leverage Kali Linux to penetrate modern infrastructures and avoid detection
  • Explore red teaming and play the hackers game to proactively defend your infrastructure

Book Description

COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.

Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.

By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and have learned about hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.

What you will learn

  • Exploit networks and data systems using wired/wireless networks, cloud infrastructure, and web services
  • Implement a server-side request forgery attack on Microsoft Exchange Server
  • Perform attacks on a supply chain using dark web information
  • Explore machine learning in pentesting
  • Understand hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies
  • Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools
  • Test for exploits of a data system using Metasploit, PowerShell Empire, and CrackMapExec

Who This Book Is For

This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.

Table of Contents

  1. Goal-Based Penetration Testing
  2. Open-Source Intelligence and Passive Reconnaissance
  3. Active Reconnaissance of External and Internal Networks
  4. Vulnerability Assessment
  5. Advanced Social Engineering and Physical Security
  6. Wireless and Bluetooth Attacks
  7. Exploiting Web-Based Applications
  8. Cloud Security Exploitation
  9. Bypassing Security Controls
  10. Exploitation
  11. Action on the Objective and Lateral Movement
  12. Privilege Escalation
  13. Command and Control
  14. Embedded Devices and RFID Hacking
on
Desktop
Tablet
Mobile

More in Data Encryption

Cryptography for Everyone - Matthew D. Green

eBOOK

RRP $61.72

$49.99

19%
OFF