Kali Linux Revealed - Mastering the Penetration Testing Distribution
1) About Kali Linux
2) Getting Started with Kali Linux
3) Linux Fundamentals
4) Installing Kali Linux
5) Configuring Kali Linux
6) Helping Yourself and Getting Help
7) Securing and Monitoring Kali Linux
8) Debian Package Management
9) Advanced Usage
10) Kali Linux in the Enterprise
11) Introduction to Security Assessments
12) Conclusion: The Road Ahead
Why This Book ?
Kali Linux is not just a collection of various information security tools that are installed on a standard Debian base and pre-set to run you up and down immediately. To get the most out of Kali, it is necessary to have an in-depth understanding of its powerful Debian GNU / Linux underpinnings (which support all those great tools) and learn how you can put them to use in your environment.
Although Kali is definitely multi-purpose, it is primarily designed to aid penetration testing. The purpose of this book is not only to help you feel at home when you use Kali Linux, but also to improve your understanding and streamline your experience so that when you appear in the entrance exam And time is of the essence, so you don't have to worry about losing precious minutes to install new software or enable a new network service. In this book, we'll first introduce you to Linux, then we'll dive deeper as we introduce you to the specifics specific to Kali Linux, so you get to know what's going on under the hood.
This is invaluable knowledge, especially when you are trying to work under tight time constraints. It is not uncommon for this depth of knowledge to be required when you are troubleshooting a problem, troubleshooting a problem, bending a device to your will, parsing output from a device, or in a large-scale environment Taking advantage of Kali.
Book Name | Kali Linux Revealed - Mastering the Penetration Testing Distribution |
Format | |
Size | 26.3 MB |
Autor | Raphaël Hertzog, Jim O’Gorman, Mati Aharoni |
Pages | 344 |
Language | English |
Post a Comment