Da: California Books, Miami, FL, U.S.A.
EUR 54,24
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Paperback or Softback. Condizione: New. Learning ParrotOS: Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system. Book.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 61,45
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Editore: Unknown, IN, 2024
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: Rarewaves USA, OSWEGO, IL, U.S.A.
EUR 59,12
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Editore: Gitforgits, 2024
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 64,55
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Editore: Gitforgits, 2024
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: Rarewaves USA United, OSWEGO, IL, U.S.A.
Paperback. Condizione: New.
Condizione: As New. Unread book in perfect condition.
Condizione: New.
Editore: Gitforgits, 2024
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: Rarewaves.com UK, London, Regno Unito
EUR 61,19
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 58,10
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 61,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 68,50
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.Use bash scripting to automate and streamline penetration testing workflows.Manage files and directories using command-line tools like rsync, grep, and awk.Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.Perform robust password audits and recover weak credentials using John the Ripper.Test wireless networks using Aircrack-ng in WEP and WPA protocols.Leverage pivoting techniques across compromised networks.Integrate automated recon and scanning for continuous network monitoring.Table of ContentGetting Started with Parrot OSUp and Running with Parrot OSSystem Configuration and CustomizationMastering Command-Line UtilitiesLeveraging Parrot OS Security ToolsConducting Network ReconnaissanceExploiting Vulnerabilities with MetasploitAdvanced Web Application TestingImplementing Sniffing and Tunneling 172 pp. Englisch.
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 68,50
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.Use bash scripting to automate and streamline penetration testing workflows.Manage files and directories using command-line tools like rsync, grep, and awk.Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.Perform robust password audits and recover weak credentials using John the Ripper.Test wireless networks using Aircrack-ng in WEP and WPA protocols.Leverage pivoting techniques across compromised networks.Integrate automated recon and scanning for continuous network monitoring.Table of ContentGetting Started with Parrot OSUp and Running with Parrot OSSystem Configuration and CustomizationMastering Command-Line UtilitiesLeveraging Parrot OS Security ToolsConducting Network ReconnaissanceExploiting Vulnerabilities with MetasploitAdvanced Web Application TestingImplementing Sniffing and TunnelingLibri GmbH, Europaallee 1, 36244 Bad Hersfeld 172 pp. Englisch.
Da: preigu, Osnabrück, Germania
EUR 65,35
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Learning ParrotOS | Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system | Arvin Destar | Taschenbuch | Englisch | 2024 | GitforGits | EAN 9788198431691 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 72,86
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.Use bash scripting to automate and streamline penetration testing workflows.Manage files and directories using command-line tools like rsync, grep, and awk.Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.Perform robust password audits and recover weak credentials using John the Ripper.Test wireless networks using Aircrack-ng in WEP and WPA protocols.Leverage pivoting techniques across compromised networks.Integrate automated recon and scanning for continuous network monitoring.Table of ContentGetting Started with Parrot OSUp and Running with Parrot OSSystem Configuration and CustomizationMastering Command-Line UtilitiesLeveraging Parrot OS Security ToolsConducting Network ReconnaissanceExploiting Vulnerabilities with MetasploitAdvanced Web Application TestingImplementing Sniffing and Tunneling.
Editore: Gitforgits, 2024
ISBN 10: 8198431691 ISBN 13: 9788198431691
Da: CitiRetail, Stevenage, Regno Unito
EUR 69,06
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.Use bash scripting to automate and streamline penetration testing workflows.Manage files and directories using command-line tools like rsync, grep, and awk.Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.Perform robust password audits and recover weak credentials using John the Ripper.Test wireless networks using Aircrack-ng in WEP and WPA protocols.Leverage pivoting techniques across compromised networks.Integrate automated recon and scanning for continuous network monitoring.Table of ContentGetting Started with Parrot OSUp and Running with Parrot OSSystem Configuration and CustomizationMastering Command-Line UtilitiesLeveraging Parrot OS Security ToolsConducting Network ReconnaissanceExploiting Vulnerabilities with MetasploitAdvanced Web Application TestingImplementing Sniffing and Tunneling This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.