Dinle ya da oku

Sesli kitapların büyülü dünyasına adım at.

  • İlk 2 ay ₺124,99/ay
  • Binlerce sesli kitap ve e-kitap.
  • Dilediğin kadar dinle ya da oku.
  • Çevrimdışı modu.
  • İstediğin zaman iptal et.
Abonelik başlat
TR - Details page - Device banner - 894x1036

Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1

Süre
11sa 13dk
Dil
İngilizce
Format
Kategori

Kurgu Dışı

2 AUDIOBOOKS IN 1!

• Book 1 - Wireless Hacking with Kali Linux • Book 2 - Ethical Hacking With Kali Linux

You will learn:

AUDIOBOOK 1:

•WPA/WPA2 Dictionary Attack

•Countermeasures to Dictionary Attacks

•Deploying Passive Reconnaissance with Kali Linux

•Countermeasures Against Passive Reconnaissance

•How to Decrypt Traffic with Wireshark

•How to implement MITM Attack with Ettercap

•Countermeasures to Protect Wireless Traffic

•How to Secure Ad Hoc Networks

•How to Physically Secure your Network

•How to deploy Rogue Access Point using MITM Attack

•How to use Wi-Spy DGx & Chanalyzer

•How to implement Deauthentication Attack against a Rogue AP

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•Encryption Terminology & Wireless Encryption Options

AUDIOBOOK 2:

•How to Install Virtual Box & Kali Linux

•Pen Testing @ Stage 1, Stage 2 and Stage 3

•How to deploy SQL Injection with SQLmap

•How to implement Dictionary Attack with Airodump-ng

•How to deploy ARP Poisoning with EtterCAP

•How to capture Traffic with Port Mirroring & with Xplico

•How to deploy Passive Reconnaissance

•How to implement MITM Attack with Ettercap & SSLstrip

•How to Manipulate Packets with Scapy

•How to deploy Deauthentication Attack

•How to capture IPv6 Packets with Parasite6

•How to deploy Evil Twin Deauthentication Attack with mdk3

•How to deploy DoS Attack with MKD3

•How to implement Brute Force Attack with TCP Hydra

•How to deploy Armitage Hail Mary

•The Metasploit Framework

•How to use SET aka Social-Engineering Toolkit and more.

© 2020 HUGO HOFFMAN (Sesli Kitap): 9781664963139

Yayın tarihi

Sesli Kitap: 26 Kasım 2020

Etiketler

Bunları da beğenebilirsin...

  1. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
  2. Hacking: How to Hack Alex Wagner
  3. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  4. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  5. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  6. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  7. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  8. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  9. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  10. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  11. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  12. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  13. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  14. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  15. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  16. How Smart Machines Think Sean Gerrish
  17. Greatest Hackers in the History Introbooks Team
  18. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
  19. Computer Science Introbooks Team
  20. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  21. Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Kevin Clark
  22. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  23. The Deep Learning Revolution Terrence J. Sejnowski
  24. Clean Architecture: A Craftsman's Guide to Software Structure and Design Robert C. Martin
  25. Java Fundamentals Introbooks Team
  26. Cybersecutity First Principles Rick Howard
  27. The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman Richard P. Feynman
  28. Clean Code: A Handbook of Agile Software Craftsmanship Robert C. Martin
  29. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
  30. Cybersecurity All-in-One For Dummies Joseph Steinberg
  31. The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
  32. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  33. Cybersecurity For Dummies Joseph Steinberg
  34. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  35. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  36. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  37. The Art of Deception: Controlling the Human Element of Security William L. Simon
  38. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  39. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  40. Cloud Security For Dummies Ted Coombs
  41. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  42. Cybercrime Investigators Handbook Graeme Edwards
  43. Cyberdeterrence and Cyberwar Martin C. Libicki
  44. Tor and the Dark Art of Anonymity Lance Henderson
  45. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  46. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman

Storytel dünyasını keşfet:

  • Kids mode

  • Çevrimdışı modu

  • İstediğin zaman iptal et

  • Her yerde erişim

Sınırsız

Sınırsızca dinlemek ve okumak isteyenler için.

₺249.99 /ay
  • 1 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Sınırsız Yıllık

Sınırsızca dinlemek ve okumak isteyenler için.

₺1499.99 /yıl
6 ay öde, 12 ay dinle
  • 1 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Aile (2 hesap)

Hikayeleri sevdikleri ile paylaşmak isteyenler için.

₺379.99 /ay
  • 2 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat

Aile (3 hesap)

Hikayeleri sevdikleri ile paylaşmak isteyenler için.

₺474.99 /ay
  • 3 hesap

  • Sınırsız erişim

  • İstediğin zaman iptal et

Abonelik başlat