Kali Linux
'p''strong''u'You are about to discover how to start hacking with the #1 hacking tool, Kali Linux, in no time, even if you’ve never hacked before!'/u''/strong''/p''p'Kali Linux is the 'strong''u'king of all penetration testing tools'/u''/strong' out there. But 'em'while its 'strong'600+ pre-installed tools and utilities are meant to make penetration testing and forensics easy'/strong', at first, 'u'it can be overwhelming for experienced and aspiring security professionals to decide which tool to use to conduct a specific penetration test'/u''/em'.'/p''p'That’s where this 'strong''u'book comes in to streamline your learning experience'/u''/strong'! If you are uncertain about where to begin even after reading and watching tons of free information online, 'strong''u'this book will give you the much needed structure to go all'/u''/strong' in into the world of ethical hacking into secure computer systems with the best tool for the job.'/p''p'Since its introduction in 2012 'strong''em''u'as a successor to the previous version, Back Track Linux,'/u''/em''/strong' Kali Linux has grown in popularity and capabilities to become the 'strong''em''u'go-to open source security tool for information security professionals around the world'/u''/em''/strong'.'/p''p'And 'em''u'this book will show you how to use it like the pros use it even if you’ve never stepped into a formal Kali Linux class before'/u''/em'!'/p''p''strong''u'In this book, we are going to cover the major features 'amp; tools provided by Kali Linux, including:'/u''/strong''/p''ul''li'Downloading, installation and set up'/li''li'Information gathering tools'/li''li''strong'Vulnerability assessment'/strong''/li''li'Wireless attacks'/li''li''strong'Web application attacks'/strong''/li''li'Exploitation tools'/li''li''strong'Forensics tools'/strong''/li''li'Sniffing and spoofing'/li''li''strong'Password cracking'/strong''/li''li'Maintaining access'/li''li''strong'Social engineering tools'/strong''/li''li'Reverse engineering tools'/li''li''strong'Hardware hacking tools'/strong''/li''li'Reporting tools'/li''li''strong'Denial of service attacks'/strong''/li''li'And much more!'/li''/ul'