Follow by Email

Search This Blog

Kali Linux Books 2018

Top Kali Linux Books 2018, Kali Linux is one of the best known and most used Linux distributions for security testing, digital investigation and penetration testing.
Share it:
a collection of books released for Kali Linux in 2017
 Kali Linux is one of the best known and most used Linux distributions for security testing, digital investigation and penetration testing. it has grown in popularity so quickly that it's now seen as an essential part of every security expert (and hacker) toolkit.

it's based on Debian GNU / Linux, which is one of the large and famous distributions of the open-source operating system. It is explicitly built with safety engineers in mind - it consists of more than 600 packages for penetration testing. It can easily be executed using a live CD or USB or used in virtual machines. Some security experts even speculate that the growing popularity of Kali Linux can be linked to the many amateur attacks that they oppose. The distribution is very easy to use, even by beginners and the large collection of applications has contributed to the outlaws to an extensive collection of hacking tutorials.

a collection of books released for Kali Linux in 2017
December 13, 2017
Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Paperback 
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes
Key Features
  • Expose wireless security threats through the eyes of an attacker,
  • Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,
  • Acquire and apply key wireless pentesting skills used by industry experts

September 12, 2017
Kali Linux Cookbook - Second Edition: Effective penetration testing solutions
About This Book
  • Learn how to scan networks to find vulnerable computers and servers
  • Hack into devices to control them, steal their data, and make them yours
  • Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux
Who This Book Is For
  • If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux
What You Will Learn
  • Acquire the key skills of ethical hacking to perform penetration testing
  • Learn how to perform network reconnaissance
  • Discover vulnerabilities in hosts
  • Attack vulnerabilities to take control of workstations and servers
  • Understand password cracking to bypass security
  • Learn how to hack into wireless networks
  • Attack web and database servers to exfiltrate data
  • Obfuscate your command and control connections to avoid firewall and IPS detection
June 30, 2017
Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book
  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs
What You Will Learn
  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network―the end users
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book
  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
  • The practical recipes will help you automate menial tasks and build your own script library
What You Will Learn
  • Develop a network-testing environment to test scanning tools and techniques
  • Understand the principles of network-scanning tools by building scripts and tools
  • Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited
  • Perform comprehensive scans to identify listening on TCP and UDP sockets
  • Get started with different Kali desktop environments--KDE, MATE, LXDE, and Xfce
  • Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more
  • Evaluate DoS threats and learn how common DoS attacks are performed
  • Learn how to use Burp Suite to evaluate web applications
June 28, 2017
Mastering Kali Linux for Web Penetration Testing: The ultimate defense against complex organized threats and attacks
Master the art of exploiting advanced web penetration techniques with Kali Linux 2016.2
About This Book
  • Make the most out of advanced web pen-testing techniques using Kali Linux 2016.2
  • Explore how Stored (a.k.a. Persistent) XSS attacks work and how to take advantage of them
  • Learn to secure your application by performing advanced web based attacks.
  • Bypass internet security to traverse from the web to a private network.
What You Will Learn
  • Establish a fully-featured sandbox for test rehearsal and risk-free investigation of applications
  • Enlist open-source information to get a head-start on enumerating account credentials, mapping potential dependencies, and discovering unintended backdoors and exposed information
  • Map, scan, and spider web applications using nmap/zenmap, nikto, arachni, webscarab, w3af, and NetCat for more accurate characterization
  • Proxy web transactions through tools such as Burp Suite, OWASP's ZAP tool, and Vega to uncover application weaknesses and manipulate responses
  • Deploy SQL injection, cross-site scripting, Java vulnerabilities, and overflow attacks using Burp Suite, websploit, and SQLMap to test application robustness
  • Evaluate and test identity, authentication, and authorization schemes and sniff out weak cryptography before the black hats do
April 21, 2017
Kali Linux Intrusion and Exploitation Cookbook

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments

About This Book
  • Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits
  • Improve your testing efficiency with the use of automated vulnerability scanners
  • Work through step-by-step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies
What You Will Learn
  • Understand the importance of security assessments over merely setting up and managing systems/processes
  • Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities
  • Discover multiple solutions to escalate privileges on a compromised machine
  • Identify security anomalies in order to make your infrastructure secure and further strengthen it
  • Acquire the skills to prevent infrastructure and application vulnerabilities
  • Exploit vulnerabilities that require a complex setup with the help of Metasploit

Share it:
Next
This is the most recent post.
Previous
Older Post

Books

Post A Comment:

0 comments: