Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Cookbook

Kali Linux Cookbook, 9781783289592 (1783289597), Packt Publishing, 2013

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.


  • Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
  • Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
  • Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

What you will learn from this book

  • Install and setup Kali Linux on multiple platforms
  • Customize Kali Linux to your individual needs
  • Locate vulnerabilities with Nessus and OpenVAS
  • Exploit vulnerabilities you've found with Metasploit
  • Learn multiple solutions to escalate privileges on a compromised machine
  • Understand how to use Kali Linux in all phases of a penetration test
  • Crack WEP/WPA/WPA2 encryption
  • Simulate an actual penetration test using Kali Linux


A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is written for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

(HTML tags aren't allowed.)

Optimal Control of Hybrid Vehicles (Advances in Industrial Control)
Optimal Control of Hybrid Vehicles (Advances in Industrial Control)

Optimal Control of Hybrid Vehicles provides a description of power train control for hybrid vehicles. The background, environmental motivation and control challenges associated with hybrid vehicles are introduced. The text includes mathematical models for all relevant components in the hybrid power train. The power split problem in hybrid...

Performance Analysis of Transaction Processing Systems
Performance Analysis of Transaction Processing Systems
This book provides the tools necessary for predicting and improving the performance of real-time computing systems, with special attention given to the rapidly growing field of on-line traDsaCtion-processing (OLTP) systems. It is aimed at two audiences:

1. The system analyst who thorougbly understands the concepts of modem operating
Virtual Networks: Pluralistic Approach for the Next Generation of Internet (ISTE)
Virtual Networks: Pluralistic Approach for the Next Generation of Internet (ISTE)
Currently, there is a strong effort on the part of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many researchers conclude that there is no one-size-fits-all solution for all user, and network provider, needs, and thus advocate a pluralist network...

Intelligent Energy Demand Forecasting (Lecture Notes in Energy)
Intelligent Energy Demand Forecasting (Lecture Notes in Energy)

As industrial, commercial, and residential demands increase and with the rise of privatization and deregulation of the electric energy industry around the world, it is necessary to improve the performance of electric operational management. Intelligent Energy Demand Forecasting offers approaches and methods to calculate optimal...

General Thoracic Surgery (2 Vol. Set)
General Thoracic Surgery (2 Vol. Set)
The leading comprehensive reference on thoracic surgery is now in its Sixth Edition. Coverage of surgical oncology has been expanded. This edition also features state-of-the-art video-assisted procedures, new chapters on tracheostomy, and new techniques for lung cancer and paraesophageal hernia. Organized by anatomic region, this two-volume work...
Oscillators Simplified, With Sixty One Projects
Oscillators Simplified, With Sixty One Projects
0 NE OF THE MOST BASIC OF ALL ELECTRONIC CIRCUITS IS THE  oscilator, or signal generator. Virtually all electronics systems incorporate at least one such circuit.

While information on signal generators is not tenibly hard to find, there has been no single source devoted to the oscillator until now.

This book tells you all
©2020 LearnIT (support@pdfchm.net) - Privacy Policy