Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Fachgebiete(RVK)
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Waltham, MA :Syngress,
    UID:
    almafu_9958086748102883
    Umfang: 1 online resource (ix, 227 pages) : , illustrations (some color)
    Ausgabe: First edition.
    ISBN: 9780124078833 , 0124078834
    Serie: Gale eBooks
    Inhalt: Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration
    Anmerkung: Description based upon print version of record. , Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing , Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager , Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball , A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards , Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys , Managing the SSH Service from the Kali GUI , English
    Weitere Ausg.: ISBN 9780124077492
    Weitere Ausg.: ISBN 0124077498
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Amsterdamm :Syngress,
    UID:
    almafu_BV042314372
    Umfang: 1 Online-Ressource (ix, 227 Seiten) : , Illustrationen, Diagramme.
    Ausgabe: First edition
    ISBN: 978-0-12-407749-2
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-0-12-407883-3
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Penetrationstest ; Kali Linux
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Waltham, MA : Elsevier Science
    UID:
    gbv_1656139650
    Umfang: Online Ressource (238 p.) , illustrations
    Ausgabe: 1st ed.
    Ausgabe: Online-Ausg.
    ISBN: 9780124078833 , 0124078834 , 9780124077492
    Inhalt: Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration tests
    Anmerkung: Includes index. - Description based upon print version of record , Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing , Social EngineeringPhishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager , Installing the GRUB LoaderCompleting the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball , A Practical Guide to Installing NessusUpdate and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards , Connection NameConnect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys , Managing the SSH Service from the Kali GUI
    Weitere Ausg.: ISBN 9780124077492
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Broad, James Hacking with Kali : Practical Penetration Testing Techniques Burlington : Elsevier Science, ©2013
    Weitere Ausg.: Druckausg. Broad, James Hacking with Kali Amsterdam [u.a.] : Syngress/Elsevier, 2014 ISBN 9780124077492
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Penetrationstest ; Kali Linux ; Electronic book ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780124077942?
Meinten Sie 9780124077423?
Meinten Sie 9780124077430?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz