دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: نویسندگان: Raphaël Hertzog, Jim O’Gorman, Mati Aharoni سری: ISBN (شابک) : 9780997615609 ناشر: Offsec Press سال نشر: 2017 تعداد صفحات: 344 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 26 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Kali Linux Revealed - Mastering the Penetration Testing Distribution به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب لینوکس Kali نشان داد - تسلط بر توزیع تست نفوذ نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
چه یک کهنه کار باشید و چه یک n00b مطلق، این بهترین مکان برای شروع با Kali Linux است، پلتفرم انتخابی حرفه ای های امنیتی، و یک سیستم عامل واقعاً صنعتی و در سطح جهانی توزیع بالغ، ایمن و سازمانی. -آماده.
Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice, and a truly industrial-grade, and world-class operating system distribution-mature, secure, and enterprise-ready.
Cover Contents Preface Foreword Introduction 1. About Kali Linux A Bit of History Relationship with Debian The Flow of Packages Managing the Difference with Debian Purpose and Use Cases Main Kali Linux Features A Live System Forensics Mode A Custom Linux Kernel Completely Customizable A Trustable Operating System Usable on a Wide Range of ARM Devices Kali Linux Policies Network Services Disabled by Default A Curated Collection of Applications Summary 2. Getting Started with Kali Linux Downloading a Kali ISO Image Where to Download What to Download Verifying Integrity and Authenticity Relying on the TLS-Protected Website Relying on PGP's Web of Trust Copying the Image on a DVD-ROM or USB Key Creating a Bootable Kali USB Drive on Windows Creating a Bootable Kali USB Drive on Linux Creating a Bootable Kali USB Drive on OS X/macOS Booting a Kali ISO Image in Live Mode On a Real Computer In a Virtual Machine Preliminary Remarks VirtualBox VMware Workstation Summary 3. Linux Fundamentals What Is Linux and What Is It Doing? Driving Hardware Unifying File Systems Managing Processes Rights Management The Command Line How To Get a Command Line Command Line Basics: Browsing the Directory Tree and Managing Files The File System The Filesystem Hierarchy Standard The User's Home Directory Useful Commands Displaying and Modifying Text Files Searching for Files and within Files Managing Processes Managing Rights Getting System Information and Logs Discovering the Hardware Summary 4. Installing Kali Linux Minimal Installation Requirements Step by Step Installation on a Hard Drive Plain Installation Booting and Starting the Installer Selecting the Language Selecting the Country Selecting the Keyboard Layout Detecting Hardware Loading Components Detecting Network Hardware Configuring the Network User Creation Configuring the Clock Detecting Disks and Other Devices Partitioning Copying the Live Image Configuring the Package Manager (apt) Installing Metapackages Installing the GRUB Boot Loader Finishing the Installation and Rebooting Installation on a Fully Encrypted File System Introduction to LVM Introduction to LUKS Setting Up Encrypted Partitions End of the Guided Partitioning with Encrypted LVM Unattended Installations Preseeding Answers With Boot Parameters With a Preseed File in the Initrd With a Preseed File in the Boot Media With a Preseed File Loaded from the Network Creating a Preseed File ARM Installations Troubleshooting Installations Summary 5. Configuring Kali Linux Configuring the Network On the Desktop with NetworkManager On the Command Line with Ifupdown On the Command Line with systemd-networkd Managing Unix Users and Unix Groups Creating User Accounts Modifying an Existing Account or Password Disabling an Account Managing Unix Groups Configuring Services Configuring a Specific Program Configuring SSH for Remote Logins Configuring PostgreSQL Databases Connection Type and Client Authentication Creating Users and Databases Managing PostgreSQL Clusters Configuring Apache Configuring Virtual Hosts Common Directives Managing Services Summary 6. Helping Yourself and Getting Help Documentation Sources Manual Pages Info Documents Package-Specific Documentation Websites Kali Documentation at kali.org/docs/ Kali Linux Communities Forums on forums.kali.org #kali-linux IRC Channel on Freenode Filing a Good Bug Report Generic Recommendations How to Communicate What to Put in the Bug Report Miscellaneous Tips Where to File a Bug Report How to File a Bug Report Filing a Bug Report in Kali Filing a Bug Report in Debian Filing a Bug Report in another Free Software Project Summary 7. Securing and Monitoring Kali Linux Defining a Security Policy Possible Security Measures On a Server On a Laptop Securing Network Services Firewall or Packet Filtering Netfilter Behavior Syntax of iptables and ip6tables Commands Rules Creating Rules Installing the Rules at Each Boot Monitoring and Logging Monitoring Logs with logcheck Monitoring Activity in Real Time Detecting Changes Auditing Packages with dpkg --verify Monitoring Files: AIDE Summary 8. Debian Package Management Introduction to APT Relationship between APT and dpkg Understanding the sources.list File Kali Repositories The Kali-Rolling Repository The Kali-Dev Repository The Kali Linux Mirrors Basic Package Interaction Initializing APT Installing Packages Installing Packages with dpkg Installing Packages with APT Upgrading Kali Linux Removing and Purging Packages Inspecting Packages Querying dpkg's Database and Inspecting .deb Files Querying the Database of Available Packages with apt-cache and apt Troubleshooting Handling Problems after an Upgrade The dpkg Log File Reinstalling Packages with apt --reinstall and aptitude reinstall Leveraging --force-* to Repair Broken Dependencies Frontends: aptitude and synaptic Aptitude Synaptic Advanced APT Configuration and Usage Configuring APT Managing Package Priorities Working with Several Distributions Tracking Automatically Installed Packages Leveraging Multi-Arch Support Enabling Multi-Arch Multi-Arch Related Changes Validating Package Authenticity APT Package Reference: Digging Deeper into the Debian Package System The control File Dependencies: the Depends Field Pre-Depends, a More Demanding Depends Recommends, Suggests, and Enhances Fields Conflicts: the Conflicts Field Incompatibilities: the Breaks Field Provided Items: the Provides Field Replacing Files: The Replaces Field Configuration Scripts Installation and Upgrade Script Sequence Package Removal Checksums, Conffiles Summary 9. Advanced Usage Modifying Kali Packages Getting the Sources Installing Build Dependencies Making Changes Applying a Patch Tweaking Build Options Packaging a New Upstream Version Starting the Build Recompiling the Linux Kernel Introduction and Prerequisites Getting the Sources Configuring the Kernel Compiling and Building the Package Building Custom Kali Live ISO Images Installing Pre-Requisites Building Live Images with Different Desktop Environments Changing the Set of Installed Packages Using Hooks to Tweak the Contents of the Image Adding Files in the ISO Image or in the Live Filesystem Adding Persistence to the Live ISO with a USB Key The Persistence Feature: Explanations Setting Up Unencrypted Persistence on a USB Key Setting Up Encrypted Persistence on a USB Key Using Multiple Persistence Stores Summary Summary Tips for Modifying Kali Packages Summary Tips for Recompiling the Linux Kernel Summary Tips for Building Custom Kali Live ISO Images 10. Kali Linux in the Enterprise Installing Kali Linux Over the Network (PXE Boot) Leveraging Configuration Management Setting Up SaltStack Executing Commands on Minions Salt States and Other Features Extending and Customizing Kali Linux Forking Kali Packages Creating Configuration Packages Creating a Package Repository for APT Summary 11. Introduction to Security Assessments Kali Linux in an Assessment Types of Assessments Vulnerability Assessment Likelihood of Occurrence Impact Overall Risk In Summary Compliance Penetration Test Traditional Penetration Test Application Assessment Formalization of the Assessment Types of Attacks Denial of Service Memory Corruption Web Vulnerabilities Password Attacks Client-Side Attacks Summary 12. Conclusion: The Road Ahead Keeping Up with Changes Showing Off Your Newly Gained Knowledge Going Further Towards System Administration Towards Penetration Testing Index