Kali Linux 2 – Assuring Security by Penetration Testing · 3rd Edition
![Kali Linux 2 – Assuring Security by Penetration Testing · 3rd Edition](/cover/7RNMgw0XsR--roX1/big/Kali%20Linux%202%20%e2%80%93%20Assuring%20Security%20by%20Penetration%20Testing%20%c2%b7%203rd%20Edition.jpg)
- Authors
- Johansen, Gerard & Allen, Lee & Heriyanto, Tedi & Ali, Shakeel
- Publisher
- Packt Publishing Limited
- ISBN
- 9781785888427
- Date
- 2016-08-31T00:00:00+00:00
- Size
- 43.21 MB
- Lang
- en
Key Features Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town—Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Book Description
Kali Linux 2 (aka Sana) is considered as the most significant release of Kali since 2013. You can use it to practice reconnaissance, social engineering, exploitation, and maintain access to your target. You can also document and report verified test results as well as perform a complete Kali Linux testing methodology.
In the third edition of this book, we focus on the use of Kali Linux 2, a free Linux distribution that contains a number of tools related to penetration testing. This book will provide you with the skills needed so you can conduct penetration testing effectively. We’ll start by showing you how to install Kali Linux then walk you through the steps of using Kali Linux to penetration test, and finally guide you through proper reporting.
What you will learn Find out to download and install your own copy of Kali Linux Properly scope and conduct the initial stages of a penetration test Conduct reconnaissance and enumeration of target networks Exploit and gain a foothold on a target system or network Obtain and crack passwords Use the Kali Linux NetHunter install to conduct wireless penetration testing Create proper penetration testing reports About the Author
Gerard Johansen is an information security professional who is currently employed by a consultancy servicing fortune 500 clients throughout North America. He has performed a number of functions including threat and risk assessments, incident response, vulnerability assessment and analysis, and penetration testing. He is a graduate of Norwich University’s Masters of Science in Information Assurance and holds the Certified Information Systems Security Professional certification.