Mastering Kali Linux for Advanced Penetration Testing, 2nd Edition Front Cover

Mastering Kali Linux for Advanced Penetration Testing, 2nd Edition

  • Length: 538 pages
  • Edition: 2nd Revised edition
  • Publisher:
  • Publication Date: 2017-09-06
  • ISBN-10: 1787120236
  • ISBN-13: 9781787120235
  • Sales Rank: #304470 (See Top 100 Books)
Description

Key Features

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Book Description

This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network-directly attacking the end user.

This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.

What you will learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealthy attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

Table of Contents

Chapter 1. Getting Up and Running with Cassandra
Chapter 2. The First Table
Chapter 3. Organizing Related Data
Chapter 4. Beyond Key-Value Lookup
Chapter 5. Establishing Relationships
Chapter 6. Denormalizing Data for Maximum Performance
Chapter 7. Expanding Your Data Model
Chapter 8. Collections, Tuples, and User-Defined Types
Chapter 9. Aggregating Time-Series Data
Chapter 10. How Cassandra Distributes Data
Chapter 11. Cassandra Multi-Node Cluster
Chapter 12. Application Development Using the Java Driver
Chapter 13. Peeking under the Hood
Chapter 14. Authentication and Authorization

To access the link, solve the captcha.