logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Handson Penetration Testing With Kali Nethunter Spy On And Protect Vulnerable Ecosystems Using The Power Of Kali Linux For Pentesting On The Go Glen D Singh Seanphilip Oriyano

  • SKU: BELL-10822764
Handson Penetration Testing With Kali Nethunter Spy On And Protect Vulnerable Ecosystems Using The Power Of Kali Linux For Pentesting On The Go Glen D Singh Seanphilip Oriyano
$ 31.00 $ 45.00 (-31%)

4.0

86 reviews

Handson Penetration Testing With Kali Nethunter Spy On And Protect Vulnerable Ecosystems Using The Power Of Kali Linux For Pentesting On The Go Glen D Singh Seanphilip Oriyano instant download after payment.

Publisher: Packt Publishing Ltd
File Extension: PDF
File size: 11.25 MB
Pages: 302
Author: Glen D. Singh; Sean-Philip Oriyano
ISBN: 9781788996686, 1788996682
Language: English
Year: 2019

Product desciption

Handson Penetration Testing With Kali Nethunter Spy On And Protect Vulnerable Ecosystems Using The Power Of Kali Linux For Pentesting On The Go Glen D Singh Seanphilip Oriyano by Glen D. Singh; Sean-philip Oriyano 9781788996686, 1788996682 instant download after payment.

Kali NetHunter is a version of the popular and powerful Kali
Linux pentesting platform, designed to be installed on mobile devices.
Hands-On Penetration Testing with Kali NetHunter will teach you the
components of NetHunter and how to install the software. You’ll also
learn about the different tools included and how to optimize and use a
package, obtain desired results, perform tests, and make your
environment more secure.

Starting with an
introduction to Kali NetHunter, you will delve into different phases of
the pentesting process. This book will show you how to build your
penetration testing environment and set up your lab. You will gain
insight into gathering intellectual data, exploiting vulnerable areas,
and gaining control over target systems. As you progress through the
book, you will explore the NetHunter tools available for exploiting
wired and wireless devices. You will work through new ways to deploy
existing tools designed to reduce the chances of detection. In the
concluding chapters, you will discover tips and best practices for
integrating security hardening into your Android ecosystem.

By
the end of this book, you will have learned to successfully use a
mobile penetration testing device based on Kali NetHunter and Android to
accomplish the same tasks you would traditionally, but in a smaller and
more mobile form factor.

What you will learn
  • Choose and configure a hardware device to use Kali NetHunter
  • Use various tools during pentests
  • Understand NetHunter suite components
  • Discover tips to effectively use a compact mobile platform
  • Create your own Kali NetHunter-enabled device and configure it for optimal results
  • Learn to scan and gather information from a target
  • Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices
Who this book is for

Hands-On
Penetration Testing with Kali NetHunter is for pentesters, ethical
hackers, and security professionals who want to learn to use Kali
NetHunter for complete mobile penetration testing and are interested in
venturing into the mobile domain. Some prior understanding of networking
assessment and Kali Linux will be helpful.

Table of Contents
  1. Introduction to Kali Nethunter
  2. Understanding the phases of Pentesting Process
  3. Intelligence-Gathering Tools
  4. Scanning and Enumeration Tools
  5. Penetrating the Target
  6. Clearing Tracks and Removing Evidence from a Target
  7. Packet Sniffing and Traffic Analysis
  8. Targeting Wireless Devices and Networks
  9. Avoiding Detection
  10. Hardening Techniques and Countermeasures
  11. Building a Lab
  12. Selecting a Kali Device and Hardware

Related Products