Ascolta e leggi

Entra in un mondo di storie

  • Ascolta e leggi quanto vuoi
  • Oltre 400.000 titoli
  • Prova gratis per 14 giorni, poi 9.99€/mese
  • Disdici quando vuoi
  • Ascolta titoli esclusivi e Storytel Original
Prova Gratis
Device Banner Block 894x1036

Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test

6 Valutazioni

1.8

Durata
2h 21min
Lingua
Inglese
Format
Categoria

Non-fiction

As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.

Thankfully, there is a solution and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing and this has become more important than ever as new ways are being discovered to break into WPA2-encrypted networks.

With Kali Linux, you have all the tools you need and in Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing, you will learn, with detailed step-by-step practical examples how to protect your network from being hacked.

In this book, you'll learn:

• How to set up a wireless lab to test your system • What the KRACK attack is • How to sniff out hidden networks, wireless packets and SSIDs • How to capture WPA-2 keys and crack them • How to attack a radius authentication system • How to sniff traffic on a wireless network • How to use stolen keys to decrypt encrypted traffic • What the Honeypot and Deauthentication attacks are • What Man-In-The-Middle and DoS attacks are • How to secure your own wireless network

What are you waiting for? Buy Now to get started today to learn how to protect your system from the latest and most sophisticated attacks.

© 2020 Peter Bradley (Audiolibro): 9781094224428

Data di uscita

Audiolibro: 11 marzo 2020

Potrebbero piacerti

Scegli il tuo piano

  • Più di 400.000 titoli

  • Kids Mode (accesso sicuro per bambini)

  • Scarica e ascolta offline

  • Disdici quando vuoi

Il più popolare

Unlimited

La scelta migliore per 1 utente. Ascolta e leggi quanto vuoi.

9.99 € /mese
14 giorni gratis
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora

Unlimited Annuale

12 mesi al prezzo di 9. Ascolta e leggi quanto vuoi.

89.99 € /anno
14 giorni gratis
Risparmia il 25%
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora

Basic

Per te che non sei un avido ascoltatore.

6.49 € /mese
14 giorni gratis
  • 1 account

  • 10 ore/mese

  • Disdici quando vuoi

Prova ora

Unlimited+

Storie per tutta la famiglia. Entrate insieme in un mondo di storie.

14.99 € /mese
7 giorni gratis
  • 2 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova ora