Marknadens största urval
Snabb leverans

Böcker utgivna av NO STARCH PR

Filter
Filter
Sortera efterSortera Populära
  • av OccupyTheWeb
    460,-

    A revised introduction to the Linux operating system for beginning hackers and penetration testers.If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, this book is an excellent first step. Using Kali Linux—an advanced penetration testing distribution of Linux—you’ll quickly pick up the basics of using the Linux operating system, and acquire the tools and techniques you’ll need to take control of a Linux environment. Later chapters focus on foundational hacking concepts like security, anonymity and scripting, along with practical tutorials and exercises that test your skills.This fully revised second edition covers the latest version of Kali, includes new options for setting up a Linux virtual machine, and discusses some differences between the bash and Z shells used on the newest versions of the distribution. It also addresses contemporary examples of real-world hacking, such as the cyberwar between Russia and Ukraine.You’ll learn how to:Install Kali on a virtual machine and build your own hacking tools Perform common tasks like manipulating text and controlling file and directory permissionsCover your tracks by leveraging the rsyslog logging utilityHide your internet activity using Tor, proxy servers, VPNs, and encrypted emailWrite bash and Python scripts to scan open ports for potential targetsIf you’re ready to dive into hacking, cybersecurity, or pentesting, Linux Basics for Hackers, 2nd Edition is exactly what you need to get going.

  • av David Kennedy
    646,-

    The new and improved guide to penetration testing using the legendary Metasploit Framework.The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with a new chapter on conducting cloud-based assessments, and discussions of contemporary evasion techniques, malicious document generation, Active Directory attacks, and more.You’ll learn:Foundational pentesting techniques, including network reconnaissance and enumerationThe Metasploit Framework's conventions, interfaces, and module systemClient-side attacks, wireless exploits, and targeted social-engineering attacksMethods of creating custom modules and porting existing exploits to the FrameworkIn a fast-paced digital ecosystem, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.