0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Penetration Testing with Raspberry Pi - (Paperback, 2nd Revised edition): Michael McPhee, Jason Beltrame Penetration Testing with Raspberry Pi - (Paperback, 2nd Revised edition)
Michael McPhee, Jason Beltrame
R1,074 Discovery Miles 10 740 Ships in 18 - 22 working days

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book * Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 * Protect your confidential data by deftly preventing various network security attacks * Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage. What You Will Learn * Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking * Learn how to store and offload pentest data from the Raspberry Pi 3 * Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques * Compromise systems using various exploits and tools using Kali Linux 2 * Bypass security defenses and remove data off a target network * Develop a command and control system to manage remotely placed Raspberry Pis * Turn a Raspberry Pi 3 into a honeypot to capture sensitive information In Detail This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0. Style and approach This concise and fast-paced guide will ensure you get hands-on with penetration testing right from the start. You will quickly install the powerful Kali Linux 2 on your Raspberry Pi 3 and then learn how to use and conduct fundamental penetration techniques and attacks.

Penetration Testing Bootcamp (Paperback): Jason Beltrame Penetration Testing Bootcamp (Paperback)
Jason Beltrame
R1,161 Discovery Miles 11 610 Ships in 18 - 22 working days

Sharpen your pentesting skill in a bootcamp About This Book * Get practical demonstrations with in-depth explanations of complex security-related problems * Familiarize yourself with the most common web vulnerabilities * Get step-by-step guidance on managing testing results and reporting Who This Book Is For This book is for IT security enthusiasts and administrators who want to understand penetration testing quickly. What You Will Learn * Perform different attacks such as MiTM, and bypassing SSL encryption * Crack passwords and wireless network keys with brute-forcing and wordlists * Test web applications for vulnerabilities * Use the Metasploit Framework to launch exploits and write your own Metasploit modules * Recover lost files, investigate successful hacks, and discover hidden data * Write organized and effective penetration testing reports In Detail Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test. In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing. Style and approach This book is delivered in the form of a 10-day boot camp style book. The day-by-day approach will help you get to know everything about penetration testing, from the use of network reconnaissance tools, to the writing of custom zero-day buffer overflow exploits.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R258 Discovery Miles 2 580
Mountain Backgammon - The Classic Game…
Lily Dyu R630 Discovery Miles 6 300
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Christmas Nativity Set - 11 Pieces
R599 R539 Discovery Miles 5 390
Morbius
Jared Leto Blu-ray disc R504 R271 Discovery Miles 2 710
Rocks-Off Chaiamo G - Purple
R1,105 R699 Discovery Miles 6 990
Midnights
Taylor Swift CD R505 Discovery Miles 5 050
Pigeon Nipple Care Cream (10g)
R103 Discovery Miles 1 030
Maped Advanced Office Scissors (21cm)
 (2)
R96 Discovery Miles 960

 

Partners