Kali Linux Cookbook : Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark (3RD)

個数:
  • ポイントキャンペーン

Kali Linux Cookbook : Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark (3RD)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 568 p.
  • 言語 ENG
  • 商品コード 9781835889800
  • DDC分類 005.8

Full Description

Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniques
DRM-free PDF version + access to Packt's next-gen Reader*

Key Features

Install and configure Kali Linux on multiple platforms, choosing the best desktop and use case
Perform expert network scanning and vulnerability analysis with Nmap, OpenVAS, and Nessus
Augment social engineering campaigns with AI chatbots for real-time, personalized engagement
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionThis hands-on guide will help you become a penetration testing expert by gaining command of the powerful tools of Kali Linux, from versions 2024.3 through 2025.1, aligned with the latest features introduced and applying them in real-world security assessments.
This cookbook's third edition is updated to include the latest advancements in cybersecurity. The author leverages their 20 years of industry experience to guide you through installing Kali on multiple platforms, setting up lab environments, and using modern tools, such as Nmap, Metasploit, Wireshark, OpenVAS, and AI-driven reconnaissance. You'll also explore automated social engineering, wireless hacking, web and database exploitation, and advanced persistence techniques, delivering a comprehensive and up-to-date penetration testing resource. Recognizing the critical role of human factors in security, this edition expands on social engineering tactics, including psychological principles and AI-driven automation, to craft highly effective attack campaigns.
By the end of this book, you'll have strengthened your grasp of the entire penetration testing process, from environment setup and reconnaissance to vulnerability analysis, exploitation, and maintaining access, and be equipped with industry-standard tools to enhance your effectiveness as a security professional.What you will learn

Find out how to scan the network to find vulnerable computers and servers
Use AI-enhanced tools for thorough reconnaissance and intelligence
Identify and exploit vulnerabilities with advanced penetration tools
Apply social engineering tactics and advanced password cracking
Perform wireless, web, and database penetration testing techniques
Maintain persistent access while avoiding detection and defenses

Who this book is forThis book is ideal for cybersecurity professionals, ethical hackers, penetration testers, red teamers, security analysts, and IT administrators looking to strengthen their offensive security skills using Kali Linux. It is also for students, career-switchers, and aspiring ethical hackers preparing for roles in cybersecurity operations and threat analysis. A basic understanding of networking, operating systems, and security fundamentals is recommended.

Contents

Table of Contents

Bootstrapping Your Cyber Arsenal
Cloak and Dagger: Stealth and Anonymity
Deep Recon: Unveiling the Digital Landscape
Nmap Mastery: Scanning with Precision
Wireshark Wizard: Network Traffic Demystified
Weakness Exposed: Advanced Vulnerability Analysis
Exploitation Unleashed: Finding the Hidden Flaws
Human Hacking: The Art of Social Engineering
Breaking Barriers: The Secrets of Password Cracking
Climbing the Ladder: Mastering Privilege Escalation
Wireless Warfare: Dominating the Airwaves
Web Warriors: Exploiting Online and Database Vulnerabilities
Persistence Pays: Securing Long-Term Access

最近チェックした商品