• الرئیسیة
  • البحث المتقدم
  • قائمة المکتبات
  • حول الموقع
  • اتصل بنا
  • نشأة

عنوان
Learn Ethical Hacking from Scratch :

پدید آورنده

موضوع
Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,Hacking.,Penetration testing (Computer security)

رده
TK5105
.
59
.
S33
2018

کتابخانه
کتابخانه مطالعات اسلامی به زبان های اروپایی

محل استقرار
استان: قم ـ شهر: قم

کتابخانه مطالعات اسلامی به زبان های اروپایی

تماس با کتابخانه : 32910706-025

1788622057
1788624785
9781788622059
9781788624787

Learn Ethical Hacking from Scratch :
[Book]
Your Stepping Stone to Penetration Testing.

Birmingham :
Packt Publishing Ltd,
2018.

1 online resource (549 pages)

Client-side attacks using social engineering.

Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What's in this book?; Preparation; Penetration testing; Network penetration testing; Gaining access; Post exploitation; Website penetration testing; Protecting your system; What is hacking?; Why should we learn about hacking?; A glimpse of hacking; Browser exploitation framework; Accessing the target computer's webcam; Summary; Chapter 2: Setting Up a Lab; Lab overview; VirtualBox; Installation of VirtualBox; Installing Kali Linux; Installing Metasploitable.
Installing WindowsCreating and using snapshots ; Summary; Chapter 3: Linux Basics; Overview of Kali Linux; Status bar icons; Connecting the wireless card; Linux commands; Commands; The ls command; The man command; The help command; The Tab button; Updating resources; Summary; Chapter 4: Network Penetration Testing; What is a network?; Network basics; Connecting to a wireless adapter; MAC addresses; Wireless modes -- managed and monitor; Enabling monitor mode manually; Enabling monitor mode using airmon-ng; Summary; Chapter 5: Pre-Connection Attacks; Packet sniffing basics.
Man-in-the-middle attacksARP spoofing using arpspoof; ARP spoofing using MITMf; Bypassing HTTPS; Session hijacking; DNS spoofing; MITMf screenshot keylogger; MITMf code injection; MITMf against a real network; Wireshark; Wireshark basics ; Wireshark filters; Summary; Chapter 9: Network Penetration Testing, Detection, and Security; Detecting ARP poisoning; Detecting suspicious behavior; Summary; Chapter 10: Gaining Access to Computer Devices; Introduction to gaining access; Server side; Client side; Post-exploitation; Sever-side attacks; Server-side attack basics.
Server-side attacks -- Metasploit basicsMetasploit remote code execution; Summary; Chapter 11: Scanning Vulnerabilities Using Tools; Installing MSFC; MSFC scan; MSFC analysis; Installing Nexpose; Running Nexpose; Nexpose analysis; Summary; Chapter 12: Client-Side Attacks; Client-side attacks; Installing Veil; Payloads overview; Generating a Veil backdoor; Listening for connections; Testing the backdoor; Fake bdm1 updates; Client-side attacks using the bdm2 BDFProxy; Protection against delivery methods; Summary; Chapter 13: Client-Side Attacks -- Social Engineering.
Targeted packet sniffing Deauthentication attack; What is a fake access point?; Creating fake access points with the MANA Toolkit; Summary; Chapter 6: Network Penetration Testing -- Gaining Access; WEP theory; Basic web cracking; Fake authentication attack; ARP request replay; WPA introduction; WPS cracking; Handshake theory; Capturing the handshake; Creating a wordlist; Wordlist cracking; Securing network from attacks; Summary; Chapter 7: Post-Connection Attacks; Post-connection attacks; The netdiscover tool; The AutoScan tool; Zenmap; Summary ; Chapter 8: Man-in-the-Middle Attacks.
0
8
8
8
8

This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.

01201872
B09055

Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
9781788622059

Kali Linux.
Kali Linux.

Computer networks-- Security measures.
Computer security.
Hacking.
Penetration testing (Computer security)
Computer networks-- Security measures.
Computer security.
COMPUTERS-- Security-- General.
Hacking.
Penetration testing (Computer security)

005
.
8/7
23

TK5105
.
59
.
S33
2018

Sabih, Zaid.

20200823060415.0
pn

 مطالعه متن کتاب 

[Book]

Y

الاقتراح / اعلان الخلل

تحذیر! دقق في تسجیل المعلومات
ارسال عودة
تتم إدارة هذا الموقع عبر مؤسسة دار الحديث العلمية - الثقافية ومركز البحوث الكمبيوترية للعلوم الإسلامية (نور)
المكتبات هي المسؤولة عن صحة المعلومات كما أن الحقوق المعنوية للمعلومات متعلقة بها
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال