02071nam a2200289Ia 4500001001300000003000600013007000200019008004100021020001800062020001500080035002200095040002200117050002600139100002400165245006600189250001200255260002800267300002300295500002000318505121000338630001101548650004401559650004201603942001201645952011101657999001301768on1237875209OCoLCt210220s2018 scua 001 0 eng d a9781725031982 a1725031981 a(OCoLC)1237875209 aTULIBbengcTULIB aQA76.9.A25bD587 20181 aDieterle, Daniel W.10aBasic security testing with Kali Linux /cDaniel W. Dieterle. a3rd ed. a[S.l. :bs.n.],cc2018. axv, 410 p. :bill. aIncludes index.0 aChapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.04aLinux. 4aPenetration testing (Computer security) 4aComputer networksxSecurity measures. 2lcccBK 00104070aPNLIBbPNLIBcGENd2021-06-17oQA76.9.A25 D587 2018pPNLIB21060156r2021-06-17w2021-06-17yBK c342d342