->
Oreilly - Information gathering with Kali Linux - 9781788625869
Oreilly - Information gathering with Kali Linux
by Sean-Philip Oriyano | Publisher: Packt Publishing | Release Date: October 2017 | ISBN: 9781788625869


Plan your installation with Kali Linux using the best hardware.About This VideoThis video shows you how to gather information about a target using various Kali Linux toolsIt covers techniques to troubleshoot and avoid problems during the installation processThis comprehensive guide covers the best way to install Kali with all the proper tools installed and up to dateIn DetailKali Linux is a Linux distribution designed for digital forensics, penetration testing, and security auditing. It is the successor of BackTrack, the world's most popular penetration testing distributor. Kali Linux includes many well-known security tools, and this course will teach you more about the tools and their usage.This course not only shows you how to install Kali Linux, but also how to properly plan the installation and select the best hardware. We'll include post-installation tasks and you'll see how to configure Kali Linux to get the best performance, as well as ensuring your project needs are satisfied. Within this, we'll show you how to gather information using the tools present in Kali Linux.The tools used in this course teach you how to acquire information about a target including web applications, documents, metadata, and other popular and powerful tools included with the distribution. This course helps you plan and install Kali Linux to get the optimal results for your specific needs. We'll emphasize how to choose the best hardware and install the distribution and troubleshoot problems that may arise during the process.The course wraps up with post-installation and configuration tasks.
  1. Chapter 1 : Hardware Options and Post-Installation Configuration
    • The Course Overview 00:08:34
    • Installing Kali Linux 00:10:49
    • Hardware Options Based on Testing and Client Requirements 00:10:24
    • Adapter Options for Bluetooth and Wireless 00:09:35
    • How Virtualization Can Impact Hardware Options 00:08:34
  2. Chapter 2 : Extracting Information from Web Servers
    • Using DNSRecon 00:07:03
    • Using Automater to Gather Metadata 00:06:07
    • Fingerprinting Web Servers 00:06:45
  3. Chapter 3 : Gathering Information from Web Servers and Applications
    • Using skipfish to Explore a Web Server and Application 00:10:06
    • Using DMitry to Gather Information 00:10:39
    • Using Sparta to Gather Information 00:07:15
  4. Chapter 4 : Fingerprinting Web Servers and Applications
    • Using Maltego to Gather and Visualize Information 00:09:35
    • Using p0f to Fingerprint a Remote System 00:09:37
    • Using lbd to Identify Load Balanced Systems 00:05:49
  5. Oreilly - Information gathering with Kali Linux


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss