Angebote zu "Penetration" (21 Treffer)

Kategorien

Shops

Hands-On Web Penetration Testing with Metasploit
52,99 € *
ggf. zzgl. Versand

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book Description Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is for This book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Anbieter: buecher
Stand: 03.06.2020
Zum Angebot
Hacking with Kali Linux: 2020 Edition: Practica...
9,95 € *
ggf. zzgl. Versand

If you are searching for the fastest way to learn the secrets of a professional hacker, then keep reading...You are about to begin a journey into the deepest areas of the web, which will lead you to understand perfectly the most effective strategies to hack any system you want, even if you have zero experience and you are brand new to programming.In this audiobook, Jason Callaway has condensed everything you need in a simple and practical way, with real-world examples, step-by-step instructions, and tips from his experience.Kali Linux is an open-source project, worldwide recognized as the most powerful tool for computer security and penetration testing, thanks to its large number of dedicated functions which will be discussed in detail.You need to stay a step ahead of any criminal hacker, which is exactly where you will be after reading Hacking with Kali Linux.Moreover, don’t forget that hacking is absolutely not necessarily associated to a criminal activity. In fact, ethical hacking is becoming one of the most requested and well-paid positions in every big company all around the world.If you are a student or a professional interested in developing a career in this world, this audiobook will be your best guide.Here’s just a tiny fraction of what you’ll discover:Different types of hacking attacksWhat is ethical hackingHow to crack any computer and any network system, accessing all the data you wantHow to master the Linux operating system and its command lineHow to use Kali Linux for hacking and penetration testingKali Linux port scanning strategiesLittle known cryptography techniquesComputer networks’ vulnerabilities and the basics of cybersecurityHow to identify suspicious signals and prevent any external attack against your own deviceHow to use VPNs and firewallsIf you are ready to access the hidden wor 1. Language: English. Narrator: Jason Belvill. Audio sample: http://samples.audible.de/bk/acx0/191177/bk_acx0_191177_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.06.2020
Zum Angebot
Hacking: How to Hack Web Apps , Hörbuch, Digita...
9,95 € *
ggf. zzgl. Versand

In order to understand hackers and protect the network infrastructure, you must think like a hacker in today’s expansive and eclectic internet, and you must understand that nothing is fully secured.Considering that you are preparing to became an ethical hacker, IT security analyst, IT security engineer, or a cybersecurity specialist, yet still in doubt and want to know about vulnerabilities in both web applications and web services, ways to hack them, as well as how to secure them, you will find this book extremely useful.If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for White Hat use only.The main focus of this audiobook is to help you understand how firewalls, intrusion detection systems, intrusion prevention systems, or honeypots work.By listening to this book, you will boost your knowledge on what is possible in today’s hacking world and help you become an ethical hacker aka penetration tester. In this audiobook, you'll learn about:Cross-site scripting attack Forceful browsing attack Banner grabbing Server fingerprinting HTML tampering Deploying mass assignment attack Cookie poisoning attack Cross-site request forgery Exposing "remember me"Privilege elevationJail-breaking Session fixation attack Keystroke logging attack Rooting android devices Rowhammer attackAnd much more...Buy this audiobook now and get started today!  1. Language: English. Narrator: Sam Thurman. Audio sample: http://samples.audible.de/bk/acx0/183330/bk_acx0_183330_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.06.2020
Zum Angebot
Linux Basics for Hackers
22,99 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 03.06.2020
Zum Angebot
Linux Basics for Hackers (eBook, ePUB)
17,95 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 03.06.2020
Zum Angebot
Linux Basics for Hackers
22,99 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 03.06.2020
Zum Angebot
Linux Basics for Hackers (eBook, ePUB)
17,95 € *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher
Stand: 03.06.2020
Zum Angebot
Hacking for Beginners: Learn Practical Hacking ...
9,95 € *
ggf. zzgl. Versand

Learn practical hacking skills! Forget about complicated textbooks and guides. Listen to this book and you will be on your way to your first hack! Hacking is a word that one often finds in the tabloids, newspapers, the Internet, and countless other places. There is a lot of news about hackers doing this or that on a daily basis. The severity of these activities can range from accessing a simple household computer system to stealing confidential data from secure government facilities. This book will serve as a guiding tool for you to understand the basics of the subject and slowly build up a base of the knowledge that you need to gain. You will be made aware of several aspects of hacking, and you will find the knowledge in here fascinating. Therefore, put on your curious glasses and dive into the world of hacking with us now. We will discuss everything from the basics of ethical hacking to all you need to know about WiFi password cracking. It should be kept in mind that to understand the concept of ethical hacking, you should be able to know all about black hat hacking and how it is done. Only then is it imperative to understand what steps you could take to stop it.  Here is a preview of what you'll learn.... What is hacking? Types of hacking  White hat hacking, or ethical hacking  Password cracking  Understanding computer viruses  Hacking wireless (Wi-Fi) networks  Hacking web servers Penetration testing  Cyber-crime  Much, much more! Download your copy today! 1. Language: English. Narrator: Glynn Amburgey. Audio sample: http://samples.audible.de/bk/acx0/108328/bk_acx0_108328_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.06.2020
Zum Angebot
Hacking!: 3 Books in 1: A Guide to Ethical Hack...
9,95 € *
ggf. zzgl. Versand

It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world. With more and more people are moving online and doing almost any task that they can there, it is likely that hacking is just going to increase over time. Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world. Would you like to be able to protect your system and learn more about the different methods hackers can use to get onto your computer through your network and wireless network? This guidebook is going to provide us with all of the information that we need to know about hacking with Kali Linux, the most complete tool to protect the network, to make sure that hackers are not able to get onto your computer and cause trouble or steal your personal information.  We will take a look at a lot of the different topics and techniques that we need to know when it comes to working with hacking on the Linux system. We will also learn how to complete a penetration test to find out where the vulnerabilities of our system lie, and how to handle our wireless network to make sure that we are going to keep our information safe. Some of the topics that we are going to take a look at here include: The different types of hackers that we may encounter. The basics of cybersecurity, web security, and cyberattacks and how these can affect your computer system and how a hacker will try to use you.  The different types of malware that hackers can use against you. The consequences of a cyber-attack and why we need to prevent it.  How to install Kali Linux onto your operating system to get started.  Some of the commands that you can send over to your terminal.  Some of the basics of the Kali Linux network and the stag 1. Language: English. Narrator: Jordan Blom. Audio sample: http://samples.audible.de/bk/acx0/181947/bk_acx0_181947_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.06.2020
Zum Angebot