Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands

Jazyk: 
english
Vazba: 
Měkká vazba
Počet stran: 
216
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you th ...Celý popis
1 123,00 Kč

Podrobné informace

Více informací
ISBN9788196228514
AutorAdvocate Team Linux
VydavatelLightning Source Inc
Jazykenglish
VazbaPaperback
Rok vydání2023
Počet stran216

Popis knihy

Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command
"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you the fundamentals of Linux, emphasising ethical hacking and penetration testing. This book employs the Kali Linux distribution to teach readers how to use Linux commands and packages to perform security testing on systems and networks.

Text manipulation, network administration, ownership and permissions, BASH scripting, proxy servers, VPNs, and wireless networks are covered. The book prepares you to perform web application hacking and build your own hacking Linux toolkit by teaching you how to use Linux commands and begin to think like a hacker. Hands-on exercises and practical examples are included in each chapter to reinforce the concepts covered.

This book is a must-have for anyone interested in a career in ethical hacking and penetration testing. Emphasizing ethical hacking practices, you'll learn not only how to hack but also how to do so responsibly and legally. This book will provide you with the skills and knowledge you need to make a positive impact in the field of cybersecurity while also acting ethically and professionally. This book will help you hone your skills and become a skilled and ethical Linux hacker, whether you're a beginner or an experienced hacker.Key Learnings

  • Learning linux binaries, complex text patterns, and combining commands
  • Modifying and cloning IP addresses, phishing MAC ID, accessing and troubleshooting DNS
  • Manipulating ownership and permissions, exploring sensitive files and writing BASH scripts
  • Working around disk partitioning, filesystem errors and logical volume management
  • Accessing proxy server policies, intercepting server performance and manipulating proxy servers
  • Setting up APs, firewalls, VLAN, managing access, WPA encryption, and network analysis using Wireshark
Table of Contents
  1. Up and Running with Linux Basics
  2. How to Manipulate Text?
  3. Administering Networks
  4. Add and Delete Applications
  5. Administering Ownership and Permissions
  6. Exploring Shells: BASH, ZSH and FISH
  7. Storage Management
  8. Working around Proxy Servers
  9. Administering VPNs
  10. Working on Wireless Networks

[Please don't forget to check out 'Look Inside' option on thumbnail to get more details on topics and subtopics under every chapter that is covered.]

Proč nakupovat na Enbooku?

  1. velký výběr

    Velký výběr

    Nabízíme miliony knih v angličtině. Od beletrie až po ty nejodborněji odborné.

  2. poštovné zdarma

    Poštovné zdarma

    Poštovné už od 54 Kč a při objednávce nad 1499 Kč doprava na pobočku Zásilkovny zdarma.

  3. skvělé ceny

    Skvělé ceny

    Ceny knih se snažíme držet při zemi a vždy pod cenou doporučovanou vydavatelem, aby si je mohl koupit opravdu každý.

  4. online podpora

    Online podpora

    Můžete využít online chatu, emailu nebo nám zatelefonovat.

  5. osobní přístup

    Osobní přístup

    Nejdůležitější je pro nás Vaše spokojenost. Prodáváme knihy, protože je milujeme. Nejsme žádní nadnárodní giganti, ale poctivá česká firma.