Cargando…

Hacking with Kali: practical penetration testing techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of...

Descripción completa

Detalles Bibliográficos
Autores principales: Broad, James, Bindner, Andrew
Lenguaje:eng
Publicado: Elsevier Science 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/1641626
_version_ 1780934877030383616
author Broad, James
Bindner, Andrew
author_facet Broad, James
Bindner, Andrew
author_sort Broad, James
collection CERN
description Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle
id cern-1641626
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Elsevier Science
record_format invenio
spelling cern-16416262021-04-21T21:23:54Zhttp://cds.cern.ch/record/1641626engBroad, JamesBindner, AndrewHacking with Kali: practical penetration testing techniquesComputing and Computers Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycleElsevier Scienceoai:cds.cern.ch:16416262013
spellingShingle Computing and Computers
Broad, James
Bindner, Andrew
Hacking with Kali: practical penetration testing techniques
title Hacking with Kali: practical penetration testing techniques
title_full Hacking with Kali: practical penetration testing techniques
title_fullStr Hacking with Kali: practical penetration testing techniques
title_full_unstemmed Hacking with Kali: practical penetration testing techniques
title_short Hacking with Kali: practical penetration testing techniques
title_sort hacking with kali: practical penetration testing techniques
topic Computing and Computers
url http://cds.cern.ch/record/1641626
work_keys_str_mv AT broadjames hackingwithkalipracticalpenetrationtestingtechniques
AT bindnerandrew hackingwithkalipracticalpenetrationtestingtechniques