Image from Google Jackets

Learn ethical hacking from scratch your stepping stone to penetration testing

By: Language: English Publication details: Packt c2018 Birmingham, UK :Description: vi, 551 p. : ill. 23 cmISBN:
  • 9781788622059
Subject(s): DDC classification:
  • 005.8 SAB
Summary: This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised.
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
English Books Anna Centenary Library 3RD FLOOR, A WING 005.8 SAB (Browse shelf(Opens below)) Checked out 14.11.2025 687678
Reference Reference Anna Centenary Library 3RD FLOOR, A WING 005.8 SAB;1 (Browse shelf(Opens below)) 1 Not for loan 687679

First Published 2018

Includes index

This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised.

There are no comments on this title.

to post a comment.

Find us on the map