Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali: Practical Penetration Testing Techniques

ISBN-10:
0124077498
ISBN-13:
9780124077492
Pub. Date:
12/04/2013
Publisher:
Elsevier Science
ISBN-10:
0124077498
ISBN-13:
9780124077492
Pub. Date:
12/04/2013
Publisher:
Elsevier Science
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali: Practical Penetration Testing Techniques

$39.95 Current price is , Original price is $39.95. You
$39.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services.

Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.


Product Details

ISBN-13: 9780124077492
Publisher: Elsevier Science
Publication date: 12/04/2013
Pages: 238
Sales rank: 1,156,239
Product dimensions: 7.40(w) x 9.10(h) x 0.50(d)

About the Author

James Broad (CISSP, C|EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation’s most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Table of Contents

Introduction

Getting and Running Kali

Hard Drive Installation

Thumb Drive Installation

SD Card Installation

Building a Custom Live CD

Updating Kali and Installing Additional Software

Configuring Network Devices

Configuring Servers and Services

Configuring and Accessing Internal and External Media

Introduction to the Pen Testing Life Cycle

Reconnaissance

Scanning

Exploitation

Maintaining Access

What People are Saying About This

From the Publisher

Learn to conduct penetration testing and assess your system environment with Kali.

From the B&N Reads Blog

Customer Reviews