- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 391字
- 2021-09-03 09:57:59
Preface
The face of hacking and cyber crime has dramatically transformed over the past couple of decades. At the end of the 20th century, many people had no idea what cyber crime was. Those people thought that hackers were malevolent mathematical geniuses that hid in the dimly lit basements and spoke in binary. But as of late, we have seen the rise of a whole new brand of hackers. Because of the public availability of hacking software and tools, the hacker of the new era could easily be your next-door neighbor, your local gas station attendant, or even your 12-year old child. Script kiddie tools such as the Low Orbit Ion Cannon (LOIC) have been used to launch massive Distributed Denial of Service (DDoS) attacks against large corporations and organizations. This free Windows download merely requires that you enter a target URL, and it also has a graphic interface that bears a striking resemblance to a space age video game.
In a world where hacking has become so easy that a child can do it, it is absolutely essential that organizations verify their own level of protection by having their networks tested using the same tools that cyber criminals use against them. But, the basic usage of these tools is not sufficient knowledge to be an effective information security professional. It is absolutely critical that information security professionals understand the techniques that are being employed by these tools, and why these techniques are able to exploit various vulnerabilities in a network or system. A knowledge of the basic underlying principles that explains how these common attack tools work enables one to effectively use them, but more importantly, it also contributes to one's ability to effectively identify such attacks and defend against them.
The intention of this book is to enumerate and explain the use of common attack tools that are available in the Kali Linux platform, but more importantly, this book also aims to address the underlying principles that define why these tools work. In addition to addressing the highly functional tools integrated into Kali Linux, we will also create a large number of Python and bash scripts that can be used to perform similar functions and/or to streamline existing tools. Ultimately, the intention of this book is to help forge stronger security professionals through a better understanding of their adversary.
- Mobile Forensics Cookbook
- 白帽子講Web安全(紀念版)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡安全能力成熟度模型:原理與實踐
- Instant Java Password and Authentication Security
- 黑客攻防實戰從入門到精通
- 黑客攻防從入門到精通
- Learning Pentesting for Android Devices
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Mastering Linux Security and Hardening
- CTF快速上手:PicoCTF真題解析(Web篇)
- 2010年中國互聯網網絡安全報告