Linux For Hackers: Getting Started with Networking, WiFi Hacking, and Python Scripting
Linux For Hackers: Getting Started with Networking, WiFi Hacking, and Python Scripting
Dati e Statistiche
Salvato in 0 liste dei desideri
Linux For Hackers: Getting Started with Networking, WiFi Hacking, and Python Scripting
Scaricabile subito
3,49 €
3,49 €
Scaricabile subito

Descrizione


In this book, you'll start with the basics of Linux and networking, then move into Wi-Fi hacking, password cracking, Python scripting, reverse shells, and securing your system. You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use. What You'll Learn: Networking Basics · Learn Essential Commands. · Tshark Commands to Monitor Networks. · Capture Usernames and Passwords with Tshark. Wi-Fi Hacking · Test your Wireless Adapter for Hacking Compatibility. · Perform a Denial of Service Attack on a Wireless Network. · Crack Wi-Fi Passwords using Hashcat. · Create a Fake Captive Portal Login Page. Password Attacks · Crack Password Hashes using Hashcat and John the Ripper. · Crack Password-Protected ZIP Files. · Bypass Windows Passwords using Kali Linux. Python Scripting · Build a Network Scanner and FTP Cracker. · Create a Keylogger using Python. · Build and Customize Wordlists. · Automate Wi-Fi Attacks with Python. · Create a Fake Captive Portal with Flask. Reverse Shells · Understand how Reverse Shells Work. · Build them using Python and Metasploit. · Detect and Block them on Linux Systems. Security · Encrypt and Decrypt Files with GPG. · Hide Secret Data Inside an Image. · Detect Malicious Wi-Fi Attacks with Wireshark. · Protect your Wi-Fi from Brute-Force Attacks. · Monitor System Logs for Suspicious Activity. By the end of this book, you'll be confident using Linux for ethical hacking. With practical examples and no fluff, this book helps you build skills that you can use in real-life situations. I 'm not responsible for what you do with this book. The content is for ETHICAL HACKING educational purposes only, not intended for malicious intent.

Dettagli

Tutti i dispositivi (eccetto Kindle) Scopri di più
Reflowable
9798231618873

Compatibilità

Formato:

Gli eBook venduti da Feltrinelli.it sono in formato ePub e possono essere protetti da Adobe DRM. In caso di download di un file protetto da DRM si otterrà un file in formato .acs, (Adobe Content Server Message), che dovrà essere aperto tramite Adobe Digital Editions e autorizzato tramite un account Adobe, prima di poter essere letto su pc o trasferito su dispositivi compatibili.

Compatibilità:

Gli eBook venduti da Feltrinelli.it possono essere letti utilizzando uno qualsiasi dei seguenti dispositivi: PC, eReader, Smartphone, Tablet o con una app Kobo iOS o Android.

Cloud:

Gli eBook venduti da Feltrinelli.it sono sincronizzati automaticamente su tutti i client di lettura Kobo successivamente all’acquisto. Grazie al Cloud Kobo i progressi di lettura, le note, le evidenziazioni vengono salvati e sincronizzati automaticamente su tutti i dispositivi e le APP di lettura Kobo utilizzati per la lettura.

Clicca qui per sapere come scaricare gli ebook utilizzando un pc con sistema operativo Windows