0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (5)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition): Cameron... Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition)
Cameron Buchanan, Vivek Ramachandran
R1,027 Discovery Miles 10 270 Ships in 10 - 15 working days

Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book * Learn wireless penetration testing with Kali Linux * Detect hidden wireless networks and discover their names * Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing * Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn * Understand the KRACK attack in full detail * Create a wireless lab for your experiments * Sniff out wireless packets, hidden networks, and SSIDs * Capture and crack WPA-2 keys * Sniff probe requests and track users through their SSID history * Attack radius authentication systems * Sniff wireless traffic and collect interesting data * Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.

Python: Penetration Testing for Developers (Paperback): Christopher Duffy, Mohit, Cameron Buchanan, Terry Ip, Andrew Mabbitt,... Python: Penetration Testing for Developers (Paperback)
Christopher Duffy, Mohit, Cameron Buchanan, Terry Ip, Andrew Mabbitt, …
R2,257 Discovery Miles 22 570 Ships in 10 - 15 working days

Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book * Sharpen your pentesting skills with Python * Develop your fluency with Python to write sharper scripts for rigorous security testing * Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn * Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution * Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages * Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources * Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs * Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks * Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert. Finally in the third module, you'll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation. This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: * Learning Penetration Testing with Python by Christopher Duffy * Python Penetration Testing Essentials by Mohit * Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound Style and approach This course provides a quick access to powerful, modern tools, and customizable scripts to kick-start the creation of your own Python web penetration testing toolbox.

Python Web Penetration Testing Cookbook (Paperback): Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, Dave Mound Python Web Penetration Testing Cookbook (Paperback)
Cameron Buchanan, Terry Ip, Andrew Mabbitt, Benjamin May, Dave Mound
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

COM051400

Kali Linux Wireless Penetration Testing: Beginner's Guide (Paperback, Ed): Vivek Ramachandran, Cameron Buchanan Kali Linux Wireless Penetration Testing: Beginner's Guide (Paperback, Ed)
Vivek Ramachandran, Cameron Buchanan
R1,256 Discovery Miles 12 560 Ships in 10 - 15 working days

About This Book Learn wireless penetration testing with Kali Linux; Backtrack's evolution Detect hidden wireless networks and discover their names Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is ForIf you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

Kali Linux CTF Blueprints (Paperback): Cameron Buchanan Kali Linux CTF Blueprints (Paperback)
Cameron Buchanan
R1,044 Discovery Miles 10 440 Ships in 10 - 15 working days

Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

Aetna Casualty & Surety Co. V. Pacific Employers Insurance Co. U.S. Supreme Court Transcript of Record with Supporting... Aetna Casualty & Surety Co. V. Pacific Employers Insurance Co. U.S. Supreme Court Transcript of Record with Supporting Pleadings (Paperback)
E R Whinham, G Cameron Buchanan
R837 R673 Discovery Miles 6 730 Save R164 (20%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bantex @School 13cm Kids Blunt Nose…
R16 Discovery Miles 160
Bestway Swim Ring (56cm)
R50 R45 Discovery Miles 450
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Medalist Insta-Fit Mouthguard (Pink)
R50 Discovery Miles 500
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
ShooAway Fly Repellent Fan (Black)
 (6)
R299 R259 Discovery Miles 2 590
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, … Blu-ray disc R326 Discovery Miles 3 260
Puzzle Sets: Number Game
R59 R56 Discovery Miles 560
Swiss Miele Vacuum Bags (4 x Bags | 2 x…
 (8)
R199 R166 Discovery Miles 1 660

 

Partners