<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Basic security testing with Kali Linux</title>
  </titleInfo>
  <name type="personal">
    <namePart>Dieterle, Daniel W.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">scu</placeTerm>
    </place>
    <place>
      <placeTerm type="text">S.l</placeTerm>
    </place>
    <publisher>s.n.]</publisher>
    <dateIssued>c2018</dateIssued>
    <dateIssued encoding="marc">2018</dateIssued>
    <edition>3rd ed.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>xv, 410 p. : ill.</extent>
  </physicalDescription>
  <tableOfContents>Chapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework &amp; BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type &amp; Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper &amp; HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking &amp; WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.</tableOfContents>
  <note type="statement of responsibility">Daniel W. Dieterle.</note>
  <note>Includes index.</note>
  <subject>
    <titleInfo>
      <title>Linux</title>
    </titleInfo>
  </subject>
  <subject>
    <topic>Penetration testing (Computer security)</topic>
  </subject>
  <subject>
    <topic>Computer networks</topic>
    <topic>Security measures</topic>
  </subject>
  <classification authority="lcc">QA76.9.A25 D587 2018</classification>
  <identifier type="isbn">9781725031982</identifier>
  <identifier type="isbn">1725031981</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg">TULIB</recordContentSource>
    <recordCreationDate encoding="marc">210220</recordCreationDate>
    <recordIdentifier source="OCoLC">on1237875209</recordIdentifier>
    <languageOfCataloging>
      <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
    </languageOfCataloging>
  </recordInfo>
</mods>
