Torrent details for "Hacking Mastery With Kali Linux" Log in to bookmark
Controls:
Category:
Language:
English
Total Size:
11.4 MB
Info Hash:
484345481B8178F3E070649E413A09D39CDE9189
Added By:
Added:
June 1, 2023, 10:53 p.m.
Stats:
| Update
File | Size |
---|
Thanks for rating :
zuluDROOG (3), jhp2025 (5), KingRagnar (5), PeakBadass (5), TWDGOTfan (5), LokiGOAT (5),
zuluDROOG (3), jhp2025 (5), KingRagnar (5), PeakBadass (5), TWDGOTfan (5), LokiGOAT (5),
Name
DL
Uploader
Size
S/L
Added
-
2.7 GB
[15
/
27]
2023-07-01
Uploaded by FreeCourseWeb | Size 2.7 GB | Health [ 15 /27 ] | Added 2023-07-01 |
-
506.6 MB
[16
/
0]
2023-07-01
Uploaded by tutsgalaxy | Size 506.6 MB | Health [ 16 /0 ] | Added 2023-07-01 |
-
569.1 MB
[32
/
7]
2023-06-02
Uploaded by tutsgalaxy | Size 569.1 MB | Health [ 32 /7 ] | Added 2023-06-02 |
NOTE
SOURCE: Hacking Mastery With Kali Linux
-----------------------------------------------------------------------------------
COVER
-----------------------------------------------------------------------------------
MEDIAINFO
Do you want to become a professional hacker?
If answer to that question is yes, then you need to learn Kali Linux. It is the most world famous and the best operating system for hacking and pentration testing!
This book will not only be teaching you hacking with kali linux, but will also teach you all the things you need to be successful in the career of hacking and pentration testing. Even if you're a complete beginner and have never used kali linux before, don't worry, because we will start you off with the very basic until you reach the advance level.
In the first 5 chapters we will be covering some basic things like setting up lab, linux basic internet protocol and more to make you comfortable with kali linux. From chapters 5 to 10 you will be learning intermediate concepts like Trojan, viruses and worms, password cracking, and network sniffing. Here you will be introduced to the real world of hacking.
In the last 5 chapters we will be covering few more advance concepts like gaining access, post exploitation, anti-virus evasions and much more. All the chapters in this book have a theoretical and a practical portion. This book also contains more then 150+ screenshots that makes complex attack easy to follow.
Table of content
Introduction
Setting up a lab
Linux basic
Internet protocol
Port number
Trojan, viruses and worms
Password attack & cracking
Network sniffing & spoofing
Staying anonmous online
Information gathering
Gaining access
Post exploitation
Anti-viurs evasion
File Transfer
Bonus Section