Тестирование на проникновение с Kali Linux
Please sign in so that we can notify you about a reply
The process of testing for penetration, its types, stages, legal and practical aspects are examined in detail. Tips are given in accordance with the test plan, the choice of tools. The possibilities of the distribution of Kali Linux, its settings, the principles of working with the command line, are shown examples of calling various commands and writing scripts for the automation of routine processes. The process of assembling a virtual laboratory for testing for penetration is described. Using the KALI Linux tools, all the stages of the pentest are described as detailed and consistently as possible: collecting information, reconnaissance and scanning, listing working in target services and services, detection of vulnerabilities, searching for exploits, operation and post -sequences. A separate section is devoted to the correct execution of the testing report on penetration and accompanying documentation
Author:
Author:Чанда Д., Джоши Пратик
Cover:
Cover:Soft
Category:
- Category:Computer & Technology
Publication language:
Publication Language:Russian
Paper:
Paper:Offset
ISBN:
ISBN:978-5-9775-1202-2
No reviews found