Text
Beginning ethical hacking with kali linux: computational techniques for resolving security issues
The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem.
In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely.
Table on Contents
About the Author
About the Technical Reviewer
Ackowledgements
Introduction
Chapter 1 Security Trends
Chapter 2 Setting Up a Penetration Testing and Network Security Lab
Chapter 3 Elementary Linux Commands
Chapter 4 Know Your Network
Chapter 5 How to Build a Kali Web Server
Chapter 6 Kali Linux from the Inside Out
Chapetr 7 Kali Linux and Python
Chapter 8 Information Gathering
Chapter 9 SQL Mapping
Chapter 10 Vulnerability Analysis
Chapter 11 Information Assurance Model
Chapter 12 Introducing Metasploit in Kali Linux
Chapter 13 Hashes and Passwords
Chapter 14 Classic and Modern Encryption
Chapter 15 Exploiting T
No other version available