Hacking With Kali Linux: Advanced Guide on Ethical Hacking and Penetration Testing with Kali. Practical Approach with Tools to Understand in De
Quantity | Price | Discount |
---|---|---|
List Price | $21.97 |
$21.97
Book Information
Publisher: | Raymond Deep |
---|---|
Publish Date: | 11/17/2020 |
Pages: | 134 |
ISBN-13: | 9781801254397 |
ISBN-10: | 1801254397 |
Language: | English |
Full Description
Welcome to the advanced guide on ethical hacking and penetration testing with Kali Linux guide. Ethical Hacking is essentially the art of protecting a system and its resources and what you will be going through in this book is the techniques, tactics and strategies which will help you understand and execute ethical hacking in a controlled environment as well as the real world. You will also be learning about Kali Linux which the choice of an operating system that is preferred by ethical hackers all over the world. You will also get exposure to tools that are a part of Kali Linux and how you can combine this operating system and its tools with the Raspberry Pi to turn into a complete toolkit for ethical hacking. You will be getting your hands dirty with all these tools and will be using the tools practically to understand how ethical hackers and security admins work together in an organization to make their systems attack proof.
As an ethical hacker, hacking tools are your priority and we will be covering tools such as NMap and Proxychains which are readily available in the Kali Linux setup. These two tools together will help us setup a system wherein we will target another system and not allow the target system to understand the source IP from where the attack is originating. We will write some basic scripts and automate those scripts to attack on a network at regular intervals to fetch us data describing the vulnerabilities of that network such as open ports, DNS server details. We will also be working with techniques and strategies for Web Application Firewall testing. This will include topics such as Cross Site Scripting and SQL injections.
Then comes Social Engineering. This focuses more on the technical aspect of gathering information which will help us to prepare for an attack and not social engineering concerned with making fraudulent phone calls or pretending to be a person to get the password from an individual.
We will also talk about Virtual Private Networks (VPN) and how it is important in the domain of ethical hacking. We will discuss how virtual private networks are used by employees of an organization to protect their connection to their corporate network from attackers who might try to steal their data by using man in the middle attacks.
We will also understand cryptography in brief and how it plays a role in hacking operations. How various cryptography puzzles can train an ethical hacker to improve their thought process and help them in the technical aspects of hacking.
In this book, you will learn about: