The Ultimate Kali Linux Book - Second Edition
Glen D. Singh
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment.
By the end of this Kali Linux audiobook, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.
Duration - 13h 46m.
Author - Glen D. Singh.
Narrator - Alex Freeman.
Published Date - Sunday, 22 January 2023.
Copyright - © 2022 Packt Publishing ©.
Location:
United States
Description:
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Duration - 13h 46m. Author - Glen D. Singh. Narrator - Alex Freeman. Published Date - Sunday, 22 January 2023. Copyright - © 2022 Packt Publishing ©.
Language:
English
Opening Credits
Duration:00:00:16
02 contributors
Duration:00:02:23
03 preface
Duration:00:13:48
04 chapter 1 introduction to ethical hacking
Duration:00:56:56
05 chapter 2 building a penetration testing lab
Duration:00:40:49
06 chapter 3 setting up for advanced hacking techniques
Duration:00:37:44
07 chapter 4 reconnaissance and footprinting part 1
Duration:00:43:17
08 chapter 4 reconnaissance and footprinting part 2
Duration:00:23:11
09 chapter 5 exploring active information gathering part 1
Duration:00:43:13
10 chapter 5 exploring active information gathering part 2
Duration:00:24:00
11 chapter 6 performing vulnerability assessments
Duration:00:36:46
12 chapter 7 understanding network penetration testing
Duration:00:47:40
13 chapter 8 performing network penetration testing part 1
Duration:00:34:48
14 chapter 8 performing network penetration testing part 2
Duration:00:33:18
15 chapter 9 advanced network penetration testing post exploitation
Duration:00:55:44
16 chapter 10 working with active directory attacks
Duration:00:46:50
17 chapter 11 advanced active directory attacks
Duration:00:38:58
18 chapter 12 delving into command and control tactics
Duration:00:34:34
19 chapter 13 advanced wireless penetration testing part 1
Duration:00:36:59
20 chapter 13 advanced wireless penetration testing part 2
Duration:00:26:22
21 chapter 14 performing client side attacks social engineering
Duration:00:31:59
22 chapter 15 understanding website application security
Duration:00:53:41
23 chapter 16 advanced website penetration testing
Duration:00:36:17
24 chapter 17 best practices for the real world
Duration:00:27:02
Ending Credits
Duration:00:00:15