Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1

Længde
11T 13M
Sprog
Engelsk
Format
Kategori

Fakta

2 AUDIOBOOKS IN 1!

• Book 1 - Wireless Hacking with Kali Linux • Book 2 - Ethical Hacking With Kali Linux

You will learn:

AUDIOBOOK 1:

•WPA/WPA2 Dictionary Attack

•Countermeasures to Dictionary Attacks

•Deploying Passive Reconnaissance with Kali Linux

•Countermeasures Against Passive Reconnaissance

•How to Decrypt Traffic with Wireshark

•How to implement MITM Attack with Ettercap

•Countermeasures to Protect Wireless Traffic

•How to Secure Ad Hoc Networks

•How to Physically Secure your Network

•How to deploy Rogue Access Point using MITM Attack

•How to use Wi-Spy DGx & Chanalyzer

•How to implement Deauthentication Attack against a Rogue AP

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•Encryption Terminology & Wireless Encryption Options

AUDIOBOOK 2:

•How to Install Virtual Box & Kali Linux

•Pen Testing @ Stage 1, Stage 2 and Stage 3

•How to deploy SQL Injection with SQLmap

•How to implement Dictionary Attack with Airodump-ng

•How to deploy ARP Poisoning with EtterCAP

•How to capture Traffic with Port Mirroring & with Xplico

•How to deploy Passive Reconnaissance

•How to implement MITM Attack with Ettercap & SSLstrip

•How to Manipulate Packets with Scapy

•How to deploy Deauthentication Attack

•How to capture IPv6 Packets with Parasite6

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•How to implement Brute Force Attack with TCP Hydra

•How to deploy Armitage Hail Mary

•The Metasploit Framework

•How to use SET aka Social-Engineering Toolkit and more.

© 2020 HUGO HOFFMAN (Lydbog): 9781664963139

Release date

Lydbog: 26. november 2020

Andre kan også lide...

  1. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  2. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  3. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  4. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  5. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  6. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  7. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  8. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  9. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  10. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  12. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  13. How Smart Machines Think Sean Gerrish
  14. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  15. Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Kevin Clark
  16. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
  17. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  18. Greatest Hackers in the History Introbooks Team
  19. Computer Science Introbooks Team
  20. Clean Architecture: A Craftsman's Guide to Software Structure and Design Robert C. Martin
  21. Java Fundamentals Introbooks Team
  22. The Deep Learning Revolution Terrence J. Sejnowski
  23. Cybersecutity First Principles Rick Howard
  24. The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
  25. Clean Code: A Handbook of Agile Software Craftsmanship Robert C. Martin
  26. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  27. Cybersecurity For Dummies Joseph Steinberg
  28. The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman Richard P. Feynman
  29. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  30. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
  31. The Art of Deception: Controlling the Human Element of Security William L. Simon
  32. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  33. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  34. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  35. Cloud Security For Dummies Ted Coombs
  36. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  37. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  38. Cybercrime Investigators Handbook Graeme Edwards
  39. Tor and the Dark Art of Anonymity Lance Henderson
  40. Cyberdeterrence and Cyberwar Martin C. Libicki
  41. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  42. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  43. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  44. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis