Kali Linux Network Scanning Cookbook
Hixon, Michael; Hutchens, Justin
Sold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since 24 March 2009
Used - Soft cover
Condition: Used - As new
Quantity: 1 available
Add to basketSold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since 24 March 2009
Condition: Used - As new
Quantity: 1 available
Add to basketPages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 2.37.
Seller Inventory # G1787287904I2N00
Work with over 100 practical recipes to use custom scripts and integrated tools in Kali Linux, and effectively master network scanning
With the ever-increasing amount of data flow in recent times, information security has become vital to any application. This is where Kali Linux plays a significant role, focusing mainly on security auditing and penetration testing. This cookbook on network scanning will train you in important scanning concepts based on version 2016.2. You'll be able to conquer any network environment by exploring a range of network scanning techniques, and learning how to script your very own tools.
Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, and fingerprinting. You will then learn how to use the tools available in Kali Linux to conquer any network environment. The book also offers extensive coverage of the popular Burp Suite and features new and updated scripts for automating scanning and target exploitation. In later chapters, you'll understand how to identify remote services and assess security risks, along with discovering how different attacks are performed. Finally, you will cover the latest features of Kali Linux 2016.2, including the enhanced Sparta tool and a variety of exciting updates.
By the end of this book, you will be equipped with the skills you need to effectively script your own tools and become an expert at network scanning.
If you're an information security professional or anyone who wants to learn all about it, this book is for you. The foundational principles covered in the book will help you if you're a beginner, while the scripting techniques and in-depth analysis will be particularly useful if you're already at an advanced level. Basic security testing experience is assumed.
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described
on the Abebooks website. If you're dissatisfied with your
purchase (Incorrect Book/Not as Described/Damaged) or if the
order hasn't arrived, you're eligible for a refund within 30
days of the estimated delivery date. If you've changed your
mind about a book that you've ordered, please use the "Ask
bookseller a question link to contact us" and we'll respond
as soon as possible.
All domestic Standard and Expedited shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – we do not use courier services for international deliveries.
Order quantity | 14 to 28 business days | 14 to 28 business days |
---|---|---|
First item | £ 15.97 | £ 15.97 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.