Conoce todo sobre Kali Linux
| AUTHOR | Santo Orcero, David |
| PUBLISHER | American Book Group - Ra-Ma (03/18/2020) |
| PRODUCT TYPE | Paperback (Paperback) |
Description
El objetivo de este libro es ayudar al lector a conocer Kali Linux, una gran suite de seguridad informtica (Description in English below). De una forma grfica y didctica el lector aprender entre otras cosas: - Qu es Kali y cmo se instala.
- Cmo se configura el modo de persistencia.
- Cul es la mecnica para hacer una prueba de intrusin con Kali.
- Cules son las herramientas ms tiles y cmo se utilizan.
- Cmo arrancar y utilizar Kali en modo forense para generar imgenes de disco sin alterar la prueba y cmo manejarlas. Description in English: The objective of this book is to help readers understand Kali Linux, a robust suite of computer security. In a graphic and educational way, the reader will learn: - What is Kali, and how is it installed?
- How persistence mode is set.
- What is the mechanics to do an intrusion test with Kali.
- What are the most useful tools, and how are they used. - How to boot and use Kali in forensic mode to generate disk images without altering the test and how to handle those images.The book is divided into the following chapters: 1. The Kali distribution.
2. Kali for intrusion tests. Phases of an intrusion test
3. Initial information collection with Kali
4. Basic vulnerability analysis
5. Password attacks
6. Wi-Fi network audits
7. Web application audits
8. Metasploit
- Cmo se configura el modo de persistencia.
- Cul es la mecnica para hacer una prueba de intrusin con Kali.
- Cules son las herramientas ms tiles y cmo se utilizan.
- Cmo arrancar y utilizar Kali en modo forense para generar imgenes de disco sin alterar la prueba y cmo manejarlas. Description in English: The objective of this book is to help readers understand Kali Linux, a robust suite of computer security. In a graphic and educational way, the reader will learn: - What is Kali, and how is it installed?
- How persistence mode is set.
- What is the mechanics to do an intrusion test with Kali.
- What are the most useful tools, and how are they used. - How to boot and use Kali in forensic mode to generate disk images without altering the test and how to handle those images.The book is divided into the following chapters: 1. The Kali distribution.
2. Kali for intrusion tests. Phases of an intrusion test
3. Initial information collection with Kali
4. Basic vulnerability analysis
5. Password attacks
6. Wi-Fi network audits
7. Web application audits
8. Metasploit
Show More
Product Format
Product Details
ISBN-13:
9781681658353
ISBN-10:
1681658356
Binding:
Paperback or Softback (Trade Paperback (Us))
Content Language:
Spanish
More Product Details
Page Count:
212
Carton Quantity:
20
Product Dimensions:
6.69 x 0.45 x 9.61 inches
Weight:
0.76 pound(s)
Feature Codes:
Illustrated
Country of Origin:
US
Subject Information
BISAC Categories
Education | Computers & Technology
Education | Security - General
Dewey Decimal:
005.8
Descriptions, Reviews, Etc.
publisher marketing
El objetivo de este libro es ayudar al lector a conocer Kali Linux, una gran suite de seguridad informtica (Description in English below). De una forma grfica y didctica el lector aprender entre otras cosas: - Qu es Kali y cmo se instala.
- Cmo se configura el modo de persistencia.
- Cul es la mecnica para hacer una prueba de intrusin con Kali.
- Cules son las herramientas ms tiles y cmo se utilizan.
- Cmo arrancar y utilizar Kali en modo forense para generar imgenes de disco sin alterar la prueba y cmo manejarlas. Description in English: The objective of this book is to help readers understand Kali Linux, a robust suite of computer security. In a graphic and educational way, the reader will learn: - What is Kali, and how is it installed?
- How persistence mode is set.
- What is the mechanics to do an intrusion test with Kali.
- What are the most useful tools, and how are they used. - How to boot and use Kali in forensic mode to generate disk images without altering the test and how to handle those images.The book is divided into the following chapters: 1. The Kali distribution.
2. Kali for intrusion tests. Phases of an intrusion test
3. Initial information collection with Kali
4. Basic vulnerability analysis
5. Password attacks
6. Wi-Fi network audits
7. Web application audits
8. Metasploit
- Cmo se configura el modo de persistencia.
- Cul es la mecnica para hacer una prueba de intrusin con Kali.
- Cules son las herramientas ms tiles y cmo se utilizan.
- Cmo arrancar y utilizar Kali en modo forense para generar imgenes de disco sin alterar la prueba y cmo manejarlas. Description in English: The objective of this book is to help readers understand Kali Linux, a robust suite of computer security. In a graphic and educational way, the reader will learn: - What is Kali, and how is it installed?
- How persistence mode is set.
- What is the mechanics to do an intrusion test with Kali.
- What are the most useful tools, and how are they used. - How to boot and use Kali in forensic mode to generate disk images without altering the test and how to handle those images.The book is divided into the following chapters: 1. The Kali distribution.
2. Kali for intrusion tests. Phases of an intrusion test
3. Initial information collection with Kali
4. Basic vulnerability analysis
5. Password attacks
6. Wi-Fi network audits
7. Web application audits
8. Metasploit
Show More
List Price $29.95
Your Price
$29.65
