About Kali Linux
<p><strong><u>You are about to discover how to start hacking with the #1 hacking tool, Kali Linux, in no time, even if you’ve never hacked before!</u></strong></p><p>Kali Linux is the <strong><u>king of all penetration testing tools</u></strong> out there. But <em>while its <strong>600+ pre-installed tools and utilities are meant to make penetration testing and forensics easy</strong>, at first, <u>it can be overwhelming for experienced and aspiring security professionals to decide which tool to use to conduct a specific penetration test</u></em>.</p><p>That’s where this <strong><u>book comes in to streamline your learning experience</u></strong>! If you are uncertain about where to begin even after reading and watching tons of free information online, <strong><u>this book will give you the much needed structure to go all</u></strong> in into the world of ethical hacking into secure computer systems with the best tool for the job.</p><p>Since its introduction in 2012 <strong><em><u>as a successor to the previous version, Back Track Linux,</u></em></strong> Kali Linux has grown in popularity and capabilities to become the <strong><em><u>go-to open source security tool for information security professionals around the world</u></em></strong>.</p><p>And <em><u>this book will show you how to use it like the pros use it even if you’ve never stepped into a formal Kali Linux class before</u></em>!</p><p><strong><u>In this book, we are going to cover the major features & tools provided by Kali Linux, including:</u></strong></p><ul><li>Downloading, installation and set up</li><li>Information gathering tools</li><li><strong>Vulnerability assessment</strong></li><li>Wireless attacks</li><li><strong>Web application attacks</strong></li><li>Exploitation tools</li><li><strong>Forensics tools</strong></li><li>Sniffing and spoofing</li><li><strong>Password cracking</strong></li><li>Maintaining access</li><li><strong>Social engineering tools</strong></li><li>Reverse engineering tools</li><li><strong>Hardware hacking tools</strong></li><li>Reporting tools</li><li><strong>Denial of service attacks</strong></li><li>And much more!</li></ul>
Show more