Hacking With Kali Linux: A Complete Guide to Learning the Basic of CyberSecurity, Wireless Network Hacking and Security Systems With Kali Linux

0
(0)

Hacking With Kali Linux: A Complete Guide to Learning the Basic of CyberSecurity, Wireless Network Hacking and Security Systems With Kali Linux
 

  • Author:M JACKYusuf Idris
  • Length: 323 pages
  • Edition: 1
  • Publication Date: 2021-04-10
  • ISBN-10: B0927GLHKG
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    There are a wide array of reasons as to why one should use Kali Linux. Let me list down a few of them:
    As free as it can get — Kali Linux has been and will always be free to use. More tools than you could think of — Kali Linux comes with over 600 different penetration testing and security analytics-related tools.
    Open-source — Kali, being a member of the Linux family, follows the widely appreciated open-source model. Their development tree is publicly viewable on Git and all of the code is available for your tweaking purposes.
    Multi-language Support — Although penetration tools tend to be written in English, it has been ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. Completely customizable — The developers at offensive security understand that not everyone will agree with their design model, so they have made it as easy as possible for the more adventurous user to customize Kali Linux to their liking, all the way down to the kernel.
    Few of the things you get to learn in this guide are:

    • Installing Kali on a VM
    • The best pre-installed tools to get you started with Kali Linux
    • Linux commands
    • Secure and Anonymous in Kali Linux by Using Tor, Proxy Servers, VPN and Encrypted Emails
    • Hacking terms you must know
    • TEXT MANIPULATION
    • ANALYZING AND MANAGING NETWORKS
    • CONTROLLING FILE AND DIRECTORY PERMISSIONS
    • SETTING MORE SECURE DEFAULT PERMISSIONS WITH MASKS
    • MANAGING USER ENVIRONMENT VARIABLES
    • BASH SCRIPTING
    • UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
    • DETECTING AND CONNECTING TO BLUETOOTH
    • MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
    • PYTHON SCRIPTING BASICS FOR HACKERS

    Why wait when you can get started right away?

    中文:

    书名:Hacking With Kali Linux: A Complete Guide to Learning the Basic of CyberSecurity, Wireless Network Hacking and Security Systems With Kali Linux

    为什么应该使用Kali Linux,原因很多。让我列举其中的几个:
    尽可能地免费–Kali Linux过去是,将来也永远是免费使用的。工具之多超出你的想象–Kali Linux附带了600多种不同的渗透测试和安全分析相关工具。
    开源–作为Linux大家庭的一员,Kali遵循广受欢迎的开源模式。他们的开发树在Git上是公开可见的,所有代码都可以用于您的调整目的。
    多语言支持-尽管渗透工具往往是用英语编写的,但已确保KALI包含真正的多语言支持,允许更多用户使用他们的母语操作并找到他们工作所需的工具。完全可定制-进攻性安全公司的开发人员明白,并不是每个人都会同意他们的设计模型,所以他们让更有冒险精神的用户尽可能容易地根据自己的喜好定制Kali Linux,一直到内核。
    在本指南中,您可以了解到的内容很少:

    • 在虚拟机上安装Kali
    • 帮助您开始使用Kali Linux的最佳预装工具
    • Linux命令
    • 使用ToR、代理服务器、VPN和加密电子邮件在Kali Linux中实现安全和匿名
    • 黑客术语你必须知道
    • 文本操作
    • ANALYZING AND MANAGING NETWORKS
    • 控制文件和目录权限
    • 使用掩码设置更安全的默认权限
    • 管理用户环境变量
    • Bash脚本编写
    • 了解和检查无线网络
    • 检测并连接到蓝牙
    • 管理Linux内核和可加载的内核模块
    • 面向黑客的Python脚本编写基础知识

    当你可以马上开始的时候,为什么还要等待?

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册