0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition): Cameron... Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition)
Cameron Buchanan, Vivek Ramachandran
R970 Discovery Miles 9 700 Ships in 10 - 15 working days

Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book * Learn wireless penetration testing with Kali Linux * Detect hidden wireless networks and discover their names * Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing * Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn * Understand the KRACK attack in full detail * Create a wireless lab for your experiments * Sniff out wireless packets, hidden networks, and SSIDs * Capture and crack WPA-2 keys * Sniff probe requests and track users through their SSID history * Attack radius authentication systems * Sniff wireless traffic and collect interesting data * Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.

Python: Penetration Testing for Developers (Paperback): Christopher Duffy, Mohit, Cameron Buchanan, Terry Ip, Andrew Mabbitt,... Python: Penetration Testing for Developers (Paperback)
Christopher Duffy, Mohit, Cameron Buchanan, Terry Ip, Andrew Mabbitt, …
R2,126 Discovery Miles 21 260 Ships in 10 - 15 working days

Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book * Sharpen your pentesting skills with Python * Develop your fluency with Python to write sharper scripts for rigorous security testing * Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn * Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution * Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages * Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources * Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs * Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks * Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert. Finally in the third module, you'll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation. This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: * Learning Penetration Testing with Python by Christopher Duffy * Python Penetration Testing Essentials by Mohit * Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound Style and approach This course provides a quick access to powerful, modern tools, and customizable scripts to kick-start the creation of your own Python web penetration testing toolbox.

Python Web Penetration Testing Cookbook (Paperback): Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, Dave Mound Python Web Penetration Testing Cookbook (Paperback)
Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, Dave Mound
R1,188 Discovery Miles 11 880 Ships in 10 - 15 working days

COM051400

Kali Linux CTF Blueprints (Paperback): Cameron Buchanan Kali Linux CTF Blueprints (Paperback)
Cameron Buchanan
R986 Discovery Miles 9 860 Ships in 10 - 15 working days

Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

Kali Linux Wireless Penetration Testing: Beginner's Guide (Paperback, Ed): Vivek Ramachandran, Cameron Buchanan Kali Linux Wireless Penetration Testing: Beginner's Guide (Paperback, Ed)
Vivek Ramachandran, Cameron Buchanan
R1,186 Discovery Miles 11 860 Ships in 10 - 15 working days

About This Book Learn wireless penetration testing with Kali Linux; Backtrack's evolution Detect hidden wireless networks and discover their names Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is ForIf you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

Aetna Casualty & Surety Co. V. Pacific Employers Insurance Co. U.S. Supreme Court Transcript of Record with Supporting... Aetna Casualty & Surety Co. V. Pacific Employers Insurance Co. U.S. Supreme Court Transcript of Record with Supporting Pleadings (Paperback)
E R Whinham, G Cameron Buchanan
R776 R635 Discovery Miles 6 350 Save R141 (18%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
Multifunction Water Gun - Gladiator
R399 R379 Discovery Miles 3 790
Dropout Boogie
Black Keys CD R384 Discovery Miles 3 840
Amiibo Super Smash Bros. Collection…
R437 Discovery Miles 4 370
Trade Professional Drill Kit Cordless…
 (9)
R2,223 Discovery Miles 22 230
Shatter Me - 9-Book Collection
Tahereh Mafi Paperback R1,699 R1,143 Discovery Miles 11 430
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Hask Keratin Protein Smoothing Shine Oil…
R90 Discovery Miles 900
Peacemaker - Season 1
John Cena DVD R212 Discovery Miles 2 120
OMC! Totally Wick-ed! Candle Kit
Hinkler Pty Ltd Kit R250 R195 Discovery Miles 1 950

 

Partners