Maggiori informazioni sul libro
Over 70 recipes for system administrators and DevOps professionals to master Kali Linux 2 and conduct effective security assessments. This resource enables users to set up a penetration testing lab for preliminary assessments of attack surfaces and running exploits. It enhances testing efficiency through automated vulnerability scanners. Step-by-step recipes guide users in detecting various vulnerabilities, exploiting them to analyze consequences, and identifying security anomalies. Targeted at those interested in information security, this book is particularly beneficial for system administrators and architects aiming to secure their infrastructure. It serves both beginners and intermediates as a reference and a source of in-depth knowledge. Readers will learn the significance of security assessments beyond mere system management, familiarize themselves with tools like OPENVAS for locating vulnerabilities, discover privilege escalation methods on compromised machines, and identify security anomalies to fortify their infrastructure. Skills to prevent vulnerabilities and exploit complex setups using Metasploit are also covered. With rising threats to critical infrastructure, this practical guide helps users leverage Kali Linux 2.0 to identify known vulnerabilities and protect against unknown ones. Organized in three phases—information gathering, vulnerability assessment, and penetration testing—it serves as an ideal refere
Acquisto del libro
Kali Linux Intrusion and Exploitation, Dhruv Shah, Ishan Girdhar
- Lingua
- Pubblicato
- 2017
- product-detail.submit-box.info.binding
- (In brossura)
Metodi di pagamento
Ancora nessuna valutazione.
