Udvidet returret til d. 31. januar 2025

Hacking

- Penetration Testing with Kali Linux: Guide for Beginners

Bag om Hacking

This book is a guide on how to use Kali Linux for penetration testing. It begins by guiding you on how to use the "Sqlmap" tool to perform an SQL injection. This will help you seal any loopholes in your databases. The book then guides you on how to use a tool named "Fluxion" so as to hack networks which are protected by WPA/WPA2. Brute forcing has been used for carrying out this kind of attack. You will also learn how to check or know the location for a particular IP address in the world. You will learn how to get details about this location in terms of longitude, country, and other parameters. The process of hiding or spoofing MAC addresses for your devices is very important for penetration testing. This book guides you on how to spoof the MAC address of your devices. After developing a website or before you can hack a website, it is good for you to scan it and identify any loopholes or vulnerabilities within it. You can then go ahead and exploit these vulnerabilities, or seal them to prevent a disaster. This book guides you on how to scan a website and identify any vulnerability within it. You are guided on how to hack Android phones by the use of Kali Linux. HTP servers usually have an open FTP port. This book guides you on how to use this port and gain access to the server. You will also know how to carry out a mass mailer attack, as well as password cracking in Kali Linux.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9781546492993
  • Indbinding:
  • Paperback
  • Sideantal:
  • 78
  • Udgivet:
  • 29. maj 2017
  • Størrelse:
  • 152x229x3 mm.
  • Vægt:
  • 100 g.
  • BLACK WEEK
Leveringstid: 8-11 hverdage
Forventet levering: 10. december 2024
Forlænget returret til d. 31. januar 2025

Beskrivelse af Hacking

This book is a guide on how to use Kali Linux for penetration testing. It begins by guiding you on how to use the "Sqlmap" tool to perform an SQL injection. This will help you seal any loopholes in your databases. The book then guides you on how to use a tool named "Fluxion" so as to hack networks which are protected by WPA/WPA2. Brute forcing has been used for carrying out this kind of attack. You will also learn how to check or know the location for a particular IP address in the world. You will learn how to get details about this location in terms of longitude, country, and other parameters. The process of hiding or spoofing MAC addresses for your devices is very important for penetration testing. This book guides you on how to spoof the MAC address of your devices. After developing a website or before you can hack a website, it is good for you to scan it and identify any loopholes or vulnerabilities within it. You can then go ahead and exploit these vulnerabilities, or seal them to prevent a disaster. This book guides you on how to scan a website and identify any vulnerability within it. You are guided on how to hack Android phones by the use of Kali Linux. HTP servers usually have an open FTP port. This book guides you on how to use this port and gain access to the server. You will also know how to carry out a mass mailer attack, as well as password cracking in Kali Linux.

Brugerbedømmelser af Hacking



Find lignende bøger
Bogen Hacking findes i følgende kategorier:

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.