Basic Security Testing with Kali Linux
<p><i>(Updated 12/2014 - All reported issues have been corrected, Veil Evasion install updated to include new install routine.</i></p> <br /><p>With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. <br /></p><p> <br />Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.</p> <br /><p> <br />In €œ<strong>Basic Security Testing with Kali Linux</strong>€Â, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system. </p> <br /><p> <br />This hands-on, step by step learning book covers topics like:</p> <br /><ul> <br /> <li>Kali Linux Introduction and Overview</li> <br /> <li>Metasploit & Metasploitable 2 Tutorials</li> <br /> <li>Information Gathering</li> <br /> <li>A section on Shodan (the €œHacker€s Google€Â)</li> <br /> <li>Exploiting Windows and Linux Systems</li> <br /> <li>Escalating Privileges in Windows</li> <br /> <li>Wireless (WiFi) Attacks</li> <br /> <li>Social Engineering Attacks</li> <br /> <li>Password Attacks</li> <br /> <li>Kali on a Raspberry Pi</li> <br /> <li>Securing your Network</li> <br /></ul> <br />Though no network can be completely €œHacker Proof€Â, knowing how an attacker works will help put you on the right track of better securing your network.