Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1

Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1

Varighed
11T 13M
Sprog
Engelsk
Format
Kategori

Fakta

2 AUDIOBOOKS IN 1!

• Book 1 - Wireless Hacking with Kali Linux • Book 2 - Ethical Hacking With Kali Linux

You will learn:

AUDIOBOOK 1:

•WPA/WPA2 Dictionary Attack

•Countermeasures to Dictionary Attacks

•Deploying Passive Reconnaissance with Kali Linux

•Countermeasures Against Passive Reconnaissance

•How to Decrypt Traffic with Wireshark

•How to implement MITM Attack with Ettercap

•Countermeasures to Protect Wireless Traffic

•How to Secure Ad Hoc Networks

•How to Physically Secure your Network

•How to deploy Rogue Access Point using MITM Attack

•How to use Wi-Spy DGx & Chanalyzer

•How to implement Deauthentication Attack against a Rogue AP

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•Encryption Terminology & Wireless Encryption Options

AUDIOBOOK 2:

•How to Install Virtual Box & Kali Linux

•Pen Testing @ Stage 1, Stage 2 and Stage 3

•How to deploy SQL Injection with SQLmap

•How to implement Dictionary Attack with Airodump-ng

•How to deploy ARP Poisoning with EtterCAP

•How to capture Traffic with Port Mirroring & with Xplico

•How to deploy Passive Reconnaissance

•How to implement MITM Attack with Ettercap & SSLstrip

•How to Manipulate Packets with Scapy

•How to deploy Deauthentication Attack

•How to capture IPv6 Packets with Parasite6

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•How to implement Brute Force Attack with TCP Hydra

•How to deploy Armitage Hail Mary

•The Metasploit Framework

•How to use SET aka Social-Engineering Toolkit and more.

© 2020 HUGO HOFFMAN (Lydbog): 9781664963139

Udgivelsesdato

Lydbog: 26. november 2020

Andre kan også lide...

Vælg dit abonnement

  • Over 1 million titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned

7 dage gratis
  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned

7 dage gratis
  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

Dig + 1 familiemedlem2 konti

179 kr. /måned

Prøv gratis

Flex

For dig som vil prøve Mofibo.

89 kr. /måned

7 dage gratis
  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis