Countdown header img desk

MAI SUNT 00:00:00:00

MAI SUNT

X

Countdown header img  mob

MAI SUNT 00:00:00:00

MAI SUNT

X

Promotii popup img

💻CÂȘTIGĂ un Laptop MacBook Air!

🍀Fii chiar tu cititorul norocos»

Hacking: Penetration Testing with Kali Linux: Guide for Beginners

De (autor): William Rowley

Coperta cărții 'Hacking: Penetration Testing with Kali Linux: Guide for Beginners - William Rowley'
Hacking: Penetration Testing with Kali Linux: Guide for Beginners

De (autor): William Rowley

This book is a guide on how to use Kali Linux for penetration testing. It begins by guiding you on how to use the "Sqlmap" tool to perform an SQL injection. This will help you seal any loopholes in your databases. The book then guides you on how to use a tool named "Fluxion" so as to hack networks which are protected by WPA/WPA2. Brute forcing has been used for carrying out this kind of attack. You will also learn how to check or know the location for a particular IP address in the world. You will learn how to get details about this location in terms of longitude, country, and other parameters. The process of hiding or spoofing MAC addresses for your devices is very important for penetration testing. This book guides you on how to spoof the MAC address of your devices. After developing a website or before you can hack a website, it is good for you to scan it and identify any loopholes or vulnerabilities within it. You can then go ahead and exploit these vulnerabilities, or seal them to prevent a disaster. This book guides you on how to scan a website and identify any vulnerability within it. You are guided on how to hack Android phones by the use of Kali Linux. HTP servers usually have an open FTP port. This book guides you on how to use this port and gain access to the server. You will also know how to carry out a mass mailer attack, as well as password cracking in Kali Linux. The following topics are discussed in this book: - Sqlmap for Website Hacking - How to Hack WPA/WPA2 without Brute Force - Checking for IP Address Location - MAC Address Spoofing - Scanning a Website for Vulnerability - Hacking Android Phones with Kali Linux -Hacking FTP Server in Kali Linux - Creating a Persistent Backdoor in Android - Mass Mailer Attack - Password Cracking
Citește mai mult

-10%

PRP: 95.33 Lei

!

Acesta este Prețul Recomandat de Producător. Prețul de vânzare al produsului este afișat mai jos.

85.80Lei

85.80Lei

95.33 Lei

Primești 85 puncte

Important icon msg

Primești puncte de fidelitate după fiecare comandă! 100 puncte de fidelitate reprezintă 1 leu. Folosește-le la viitoarele achiziții!

Livrare in 2-4 saptamani

Descrierea produsului

This book is a guide on how to use Kali Linux for penetration testing. It begins by guiding you on how to use the "Sqlmap" tool to perform an SQL injection. This will help you seal any loopholes in your databases. The book then guides you on how to use a tool named "Fluxion" so as to hack networks which are protected by WPA/WPA2. Brute forcing has been used for carrying out this kind of attack. You will also learn how to check or know the location for a particular IP address in the world. You will learn how to get details about this location in terms of longitude, country, and other parameters. The process of hiding or spoofing MAC addresses for your devices is very important for penetration testing. This book guides you on how to spoof the MAC address of your devices. After developing a website or before you can hack a website, it is good for you to scan it and identify any loopholes or vulnerabilities within it. You can then go ahead and exploit these vulnerabilities, or seal them to prevent a disaster. This book guides you on how to scan a website and identify any vulnerability within it. You are guided on how to hack Android phones by the use of Kali Linux. HTP servers usually have an open FTP port. This book guides you on how to use this port and gain access to the server. You will also know how to carry out a mass mailer attack, as well as password cracking in Kali Linux. The following topics are discussed in this book: - Sqlmap for Website Hacking - How to Hack WPA/WPA2 without Brute Force - Checking for IP Address Location - MAC Address Spoofing - Scanning a Website for Vulnerability - Hacking Android Phones with Kali Linux -Hacking FTP Server in Kali Linux - Creating a Persistent Backdoor in Android - Mass Mailer Attack - Password Cracking
Citește mai mult

De același autor

Părerea ta e inspirație pentru comunitatea Libris!

Istoricul tău de navigare

Acum se comandă

Noi suntem despre cărți, și la fel este și

Newsletter-ul nostru.

Abonează-te la veștile literare și primești un cupon de -10% pentru viitoarea ta comandă!

*Reducerea aplicată prin cupon nu se cumulează, ci se aplică reducerea cea mai mare.

Mă abonez image one
Mă abonez image one
Accessibility Logo