Cargando…
Hacking with Kali: practical penetration testing techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier Science
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1641626 |
_version_ | 1780934877030383616 |
---|---|
author | Broad, James Bindner, Andrew |
author_facet | Broad, James Bindner, Andrew |
author_sort | Broad, James |
collection | CERN |
description | Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle |
id | cern-1641626 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Elsevier Science |
record_format | invenio |
spelling | cern-16416262021-04-21T21:23:54Zhttp://cds.cern.ch/record/1641626engBroad, JamesBindner, AndrewHacking with Kali: practical penetration testing techniquesComputing and Computers Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycleElsevier Scienceoai:cds.cern.ch:16416262013 |
spellingShingle | Computing and Computers Broad, James Bindner, Andrew Hacking with Kali: practical penetration testing techniques |
title | Hacking with Kali: practical penetration testing techniques |
title_full | Hacking with Kali: practical penetration testing techniques |
title_fullStr | Hacking with Kali: practical penetration testing techniques |
title_full_unstemmed | Hacking with Kali: practical penetration testing techniques |
title_short | Hacking with Kali: practical penetration testing techniques |
title_sort | hacking with kali: practical penetration testing techniques |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1641626 |
work_keys_str_mv | AT broadjames hackingwithkalipracticalpenetrationtestingtechniques AT bindnerandrew hackingwithkalipracticalpenetrationtestingtechniques |