- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 180字
- 2021-07-02 12:38:25
Introduction to Kali NetHunter
Hacking is an interesting topic of discussion for lots of people, whether they work in the field of cybersecurity or are simply interested in learning the details of how it’s done. Often, TV shows and movies incorporate hackers into the plot. Some TV shows, fictional or non-fictional, are solely based on hacking, notable one being Mr. Robot. In the show, a young man orchestrates and executes various cyberattacks on multiple organizations using real-world techniques.
Many TV shows and movies often show a hacker using a mobile or other handheld devices to infiltrate a target network. This begs the question: is hacking from a mobile device, such as a phone, possible? The answer to this question is yes. We are surrounded by so much technology and so many smart devices. Imagine using your smart device to test a network or system for vulnerabilities and perhaps exploit it; this would definitely be very cool.
In this chapter, we will be covering the following topics:
- Introducing Kali NetHunter
- The Android platform and Security model
- Installing Kali NetHunter
- Extending Symfony2 Web Application Framework
- 計算機網絡安全技術(第6版·慕課版)
- API安全實戰
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡安全技術及應用(第3版)
- 黑客攻防與無線安全從新手到高手(超值版)
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全與DevOps保障
- Digital Forensics with Kali Linux
- 互聯網企業安全高級指南
- Learning Pentesting for Android Devices
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Cybersecurity Threats,Malware Trends,and Strategies
- 復雜信息系統網絡安全體系建設指南
- Mastering Malware Analysis