|
Book details / order |
KALI LINUX NETWORK SCANNING COOKBOOK OVER 90 HANDS-ON RECIPES EXPLANING HOW TO LEVERAGE CUSTOM SCRIPTS AND INTEGRATED TOOLS IN KALI LINUX TO EFFECTIVELY MASTER NETWORK SCANNING |
About this book
learn the fundamentals behind commonly used scanning techniques
deploy powerful scanning tools that are integrated into the kali linux testing platform
a step-by-step guide, full of recipes that will help you use integrated scanning tools in kali linux, and develop custom scripts for making new and unique tools of your own
who this book is for
"kali linux network scanning cookbook" is intended for information security professionals and casual security enthusiasts alike. it will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. whether you are brand new to kali linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. it is assumed that the reader has some basic security testing experience.
what you will learn
develop a network-testing environment that can be used to test scanning tools and techniques
understand the underlying principles of network scanning technologies by building custom scripts and tools
perform comprehensive scans to identify listening on tcp and udp sockets
examine remote services to identify type of service, vendor, and version
evaluate denial of service threats and develop an understanding of how common denial of service attacks are performed
identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them
in detail
kali linux network scanning cookbook will introduce you to critical scanning concepts. you will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. you will learn how to utilize the arsenal of tools available in kali linux to conquer any network environment. you will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. this immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them.
about the authors
justin hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. he previously served in the united states air force where he worked as an intrusion detection specialist, network vulnerability analyst and malware forensic investigator for a large enterprise network with over 55,000 networked systems. he currently holds a bachelor’s degree in information technology and multiple professional information security certifications, to include cissp (certified information systems security professional), oscp (offensive security certified professional), ewpt (elearnsecurity web-application penetration tester), gcih (giac certified incident handler), cnda (certified network defense architect), ceh (certified ethical hacker), ecsa (ec-council certified security analyst) and chfi (computer hacking forensic investigator).
Author : Justin hutchens
Publication : Packt publication
Isbn : 9789351107835
Store book number : 105
NRS 1320.00
|
|
|
|
|
|
|
|
|
|