Details for this torrent 

Web Penetration Testing with Kali Linux
Type:
Other > E-books
Files:
1
Size:
19.26 MiB (20196837 Bytes)
Texted language(s):
English
Tag(s):
kali linux pentesting hacking web
Uploaded:
2014-06-02 03:26:17 GMT
By:
Anonymous
Seeders:
0
Leechers:
1
Comments
1  

Info Hash:
106A131C9137F195F05A5C63FB7CEA856C167846




(Problems with magnets links are fixed by upgrading your torrent client!)
■▀■▄▄█▓▀▀▀▓█▄          ▄██▄                       ▄██▄          ▄█▓▀▀▀▓█▄▄■▀■ █
■▄▄▓▄██▄▄▄▄▄■▀█░     ░■▀▀███      RELEASE          ███▀▀■░     ░█▀■▄▄▄▄▄██▄▓▄▄■
  ▀▓▓▀▄  ▓▀░▄▄ ▀█▄▄    ▄▓█▀                         ▀█▓▄    ▄▄█▀ ▄▄░▀▓  ▄▀▓▓▀
 ▒ █▓ ░█▄  ▒  ▀▄  ▀▀▓█▓▀▀                             ▀▀▓█▓▀▀  ▄▀  ▒  ▄█░ ▓█ ░
 ░ ██   █  ░     ▀■                                         ■▀     ░  █   ██ ░
 ░ ▒█   ▓ ■                                                         ■ ▓   █▒ ▒
   ░▀ ▄▓▀                                                             ▀▓▄ ▀░ ░
   ▄▄▀▀                                                                 ▀▀▄▄
▓▀▀ ▄  ░                                                               ░  ▄ ▀▀▓
░  ▄▓▄ ▒                                                               ▒ ▄▓▄  ░
   █▓█ ▒                                                               ▒ █▓█  ▄
░  █▓█ ░                                                               ░ █▓█  ░
   █▓█    TITLE: WEB PENETRATION TESTING WITH KALI LINUX                 █▓█
   █▒█                                                                   █▒█
   █▒█    PUBLISHER....: PACKT                LANGUAGE......: ENGLISH    █▒█
   █▒█    LINK.........: RELEASE TYPE..: RETAIL     █▒█
   █▒█    FORMAT.......: PDF                  RELEASE DATE..: 2014.03.03 █▒█
   █▒█    ISBN.........: 9781782163169        STORE DATE....: 2013       █▒█
   █▒█    SAVED.MONEY..: 24 EURO              DISKCOUNT.....: 05 x 05MB  █▒█
   █▒█                                                                   █▒█
   █▒█    AUTHOR.......: JOSEPH MUNIZ, AAMIR LAKHANI                     █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
 ░ █▓█ ░                                                               ░ █▓█ ░
 ░ █▓█ ▒                                                               ▒ █▓█ ░
 ▒ █▓█ ▒                                                               ▒ █▓█ ▒
   █▓█                                                                   █▓█ 
   █▓▀                                                                   ▀▓█
   ▀                                                                       ▀    
 ■▀■▄▄█▓▀▀▀▓█▄          ▄██▄                       ▄██▄          ▄█▓▀▀▀▓█▄▄■▀■
■▄▄▓▄██▄▄▄▄▄■▀█░     ░■▀▀███       BOOK            ███▀▀■░     ░█▀■▄▄▄▄▄██▄▓▄▄■
  ▀▓▓▀▄  ▓▀░▄▄ ▀█▄▄    ▄▓█▀                         ▀█▓▄    ▄▄█▀ ▄▄░▀▓  ▄▀▓▓▀
 ▒ █▓ ░█▄  ▒  ▀▄  ▀▀▓█▓▀▀                             ▀▀▓█▓▀▀  ▄▀  ▒  ▄█░ ▓█ ░
 ░ ██   █  ░     ▀■                                         ■▀     ░  █   ██ ░
 ░ ▒█   ▓ ■                                                         ■ ▓   █▒ ▒
   ░▀ ▄▓▀                                                             ▀▓▄ ▀░ ░
   ▄▄▀▀                                                                 ▀▀▄▄
▓▀▀ ▄  ░                                                               ░  ▄ ▀▀▓
░  ▄▓▄ ▒                                                               ▒ ▄▓▄  ░
   █▓█ ▒                                                               ▒ █▓█  ▄
░  █▓█ ░                                                               ░ █▓█  ░
   █▓█ ░                                                               ░ █▓█
   █▒█ ░                                                               ░ █▒█
   █▒█ Kali Linux is built for professional penetration testing and      █▒█
   █▒█ security auditing. It is the next-generation of BackTrack, the    █▒█
   █▒█ most popular open-source penetration toolkit in the world.        █▒█
   █▒█ Readers will learn how to think like real attackers, exploit      █▒█
   █▒█ systems, and expose vulnerabilities.                              █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█ Even though web applications are developed in a very secure       █▒█
   █▒█ environment and have an intrusion detection system and firewall   █▒█
   █▒█ in place to detect and prevent any malicious activity, open ports █▒█
   █▒█ are a pre-requisite for conducting online business. These ports   █▒█
   █▒█ serve as an open door for attackers to attack these applications. █▒█
   █▒█ As a result, penetration testing becomes essential to test the    █▒█
   █▒█ integrity of web-applications. Web Penetration Testing with Kali  █▒█
   █▒█ Linux is a hands-on guide that will give you step-by-step methods █▒█
   █▒█ on finding vulnerabilities and exploiting web                     █▒█
   █▒█ applications.                                                     █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█ "Web Penetration Testing with Kali Linux" looks at the aspects of █▒█
   █▒█ web penetration testing from the mind of an attacker. It provides █▒█
   █▒█ real-world, practical step-by-step instructions on how to perform █▒█
   █▒█ web penetration testing exercises.                                █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█ You will learn how to use network reconnaissance to pick your     █▒█
   █▒█ targets and gather information. Then, you will use server-side    █▒█
   █▒█ attacks to expose vulnerabilities in web servers and their        █▒█
   █▒█ applications. Client attacks will exploit the way end users use   █▒█
   █▒█ web applications and their workstations. You will also learn how  █▒█
   █▒█ to use open source tools to write reports and get tips on how to  █▒█
   █▒█ sell penetration tests and look out for common pitfalls.          █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█ On the completion of this book, you will have the skills needed   █▒█
   █▒█ to use Kali Linux for web penetration tests and expose            █▒█
   █▒█ vulnerabilities on web applications and clients that access       █▒█
   █▒█ them.                                                             █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█                                                                   █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
 ░ █▓█ ░                                                               ░ █▓█ ░
 ░ █▓█ ▒                                                               ▒ █▓█ ░
 ▒ █▓█ ▒                                                               ▒ █▓█ ▒
   █▓█                                                                   █▓█ 
   █▓▀                                                                   ▀▓█
   ▀                                                                       ▀    
 ■▀■▄▄█▓▀▀▀▓█▄          ▄██▄                       ▄██▄          ▄█▓▀▀▀▓█▄▄■▀■
■▄▄▓▄██▄▄▄▄▄■▀█░     ░■▀▀███       NOTES/NEWS      ███▀▀■░     ░█▀■▄▄▄▄▄██▄▓▄▄■
  ▀▓▓▀▄  ▓▀░▄▄ ▀█▄▄    ▄▓█▀                         ▀█▓▄    ▄▄█▀ ▄▄░▀▓  ▄▀▓▓▀
 ▒ █▓ ░█▄  ▒  ▀▄  ▀▀▓█▓▀▀                             ▀▀▓█▓▀▀  ▄▀  ▒  ▄█░ ▓█ ░
 ░ ██   █  ░     ▀■                                         ■▀     ░  █   ██ ░
 ░ ▒█   ▓ ■                                                         ■ ▓   █▒ ▒
   ░▀ ▄▓▀                                                             ▀▓▄ ▀░ ░
   ▄▄▀▀                                                                 ▀▀▄▄
▓▀▀ ▄  ░                                                               ░  ▄ ▀▀▓
░  ▄▓▄ ▒                                                               ▒ ▄▓▄  ░
   █▓█ ▒                                                               ▒ █▓█  ▄
░  █▓█ ░                                                               ░ █▓█  ░
   █▓█ ░                                                               ░ █▓█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█ ░                                                               ░ █▒█
 ░ █▓█ ░                                                               ░ █▓█ ░
 ░ █▓█ ▒                                                               ▒ █▓█ ░
 ▒ █▓█ ▒                                                               ▒ █▓█ ▒
   █▓█                                                                   █▓█ 
   █▓▀                                                                   ▀▓█
 ■▀■▄▄█▓▀▀▀▓█▄          ▄██▄                       ▄██▄          ▄█▓▀▀▀▓█▄▄■▀■
■▄▄▓▄██▄▄▄▄▄■▀█░     ░■▀▀███       RESPECT         ███▀▀■░     ░█▀■▄▄▄▄▄██▄▓▄▄■
  ▀▓▓▀▄  ▓▀░▄▄ ▀█▄▄    ▄▓█▀                         ▀█▓▄    ▄▄█▀ ▄▄░▀▓  ▄▀▓▓▀
 ▒ █▓ ░█▄  ▒  ▀▄  ▀▀▓█▓▀▀                             ▀▀▓█▓▀▀  ▄▀  ▒  ▄█░ ▓█ ░
 ░ ██   █  ░     ▀■                                         ■▀     ░  █   ██ ░
 ░ ▒█   ▓ ■                                                         ■ ▓   █▒ ▒
   ░▀ ▄▓▀                                                             ▀▓▄ ▀░ ░
   ▄▄▀▀     WE PAY OUR RESPECT TO:                                      ▀▀▄▄
▓▀▀ ▄  ░                                                               ░  ▄ ▀▀▓
░  ▄▓▄ ▒    BBL - DDU - EEn - iNTENSiTY - JGT - RBS                    ▒ ▄▓▄  ░
   █▓█ ░                                                               ░ █▓█  ▄
░  █▓█                                                                   █▓█  ░
   █▒█      GREETINGS FLY OUT TO:                                        █▒█
   █▒█                                                                   █▒█
   █▒█ ░    DVT - LAXiTY - SO                                          ░ █▒█
   █▒█ ░                                                               ░ █▒█
   █▒█                                                                   █▒█    
   █▒█                                                  ░▒▒▓▓▒░          █▓█    
 ░ █▓█      TEAM KYRIE ELEISON!                      ▒███████████░       █▓█ 

File list not available.

Comments