Hacking with Kali Linux - When you don't know sh#t Audiobook By Lyron Foster cover art

Hacking with Kali Linux - When you don't know sh#t

Virtual Voice Sample

Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Hacking with Kali Linux - When you don't know sh#t

By: Lyron Foster
Narrated by: Virtual Voice
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $3.99

Buy for $3.99

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

Hacking with Kali Linux - When you don't know sh#t is a comprehensive guide to ethical hacking using the Kali Linux operating system. The book provides a detailed introduction to the basics of hacking and covers the tools and techniques used in ethical hacking.

The book is written for individuals who are interested in learning about ethical hacking and have little to no experience with Kali Linux. It is also suitable for individuals who have experience with other operating systems and are interested in learning about Kali Linux.

The book is divided into eight chapters, with each chapter focusing on a specific aspect of ethical hacking. The first chapter provides an introduction to hacking, its types, ethics, and legal implications, as well as an overview of Kali Linux tools for ethical hacking. The second chapter covers the downloading and installation of Kali Linux, as well as setting up virtual environments for hacking and basic configuration of Kali Linux.

Chapters three and four cover information gathering, scanning for open ports and services, vulnerability scanning and exploitation using Kali Linux tools. Chapter five focuses on password cracking and wireless network hacking, including techniques for wireless network penetration testing.

Chapter six covers advanced hacking techniques, including exploiting web applications, social engineering, evading detection, and staying anonymous. Chapter seven delves into forensics and analysis, including techniques for forensic analysis, using Kali Linux tools for forensic analysis, recovering data from a compromised system, and analysis of logs and event data.

Finally, chapter eight covers building a secure network using Kali Linux tools, monitoring and protecting a network from attacks, and techniques for securing web applications and databases.

Throughout the book, readers are provided with examples and hypothetical scenarios to help them understand and apply the concepts covered. By the end of the book, readers will have gained a comprehensive understanding of ethical hacking using Kali Linux and will be able to apply their knowledge in real-world situations.
Security & Encryption Computer Security Hacking Software
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Hacking with Kali Linux - When you don't know sh#t

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.