How to BUY Online - Simple Steps
- Register करके Login कीजिए।
- Price Page पर "Add to cart" Button को Click करके वांछित पुस्तकें Shopping Cart में Add कीजिए।
- My Shopping Cart Widget में दिखाई देने वाले Checkout Button को Click कीजिए।
- एक से अधिक EBooks खरीदने पर Extra Discount के लिए Coupon Code Apply कीजिए।
- अपनी Billing Detail Fill करते हुए Gpay, Phonepay या Manual Payment Option Select करके "Place order" Button पर Click कीजिए।
- Total Payable Amount का भुगतान कीजिए और पुस्तकें Download कीजिए अपने EMail या My Account से, तुरन्त।
- पुस्तकें खरीदने से सम्बंधित किसी भी प्रकार की समस्या होने पर 91-8655-567-778 पर Call / WhatsApp कीजिए।
Most Read Articles
- Why Learn Python Programming Language
- Why Learn C Programming Language
- Why Learn Java Programming Language
- Why Learn iOS App Development
- Why Learn Android App Development
- Why Learn C# Programming Language
- Why Learn Oracle 12C
- Why Learn HTML5 with CSS3
- Why Learn JavaScript
- Why Learn WordPress Framework
- Why Learn PHP
- Why Learn C++ Programming Language
- Why Learn Penetration Testing?
- Why Learn Bitcoin?
Kali Linux with Practical Penetration Testing in Hindi
₹350.00
Kali Linux जिसे Penetration Testing के रूप में भी जाना जाता है। एक कंप्यूटर सिस्टम पर एक सिम्युलेटेड साइबर अटैक है जो exploitable vulnerabilities की तलाश में है। वेब एप्लिकेशन सुरक्षा के संदर्भ में, वेब एप्लिकेशन फायरवॉल (WAF) का विस्तार करने के लिए अक्सर प्रवेश परीक्षण का उपयोग किया जाता है।
Penetration Testing से प्राप्त Insights का उपयोग WAF सुरक्षा नीतियों और पैच की खोज की गई कमजोरियों को ठीक करने के लिए किया जा सकता है। ऐसे बहुत सारे विभिन्न अवधारणाओं को भी इस पुस्तक में विस्तार से समझाया गया है।
Table of Contents
Kali Linux with Practical Penetration Testing
Chapter 1: Kali – Penetration Testing in Hindi
Introduction
Configuring Kali Linux
Getting ready
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Getting ready
Dnscan
Subbrute
Dirsearch Pentesting
VPN’s ike-scan
Cracking the PSK
Setting up proxychains
Using proxychains with tor
Going on a hunt with Routerhunter
Chapter 2: Gathering Intel and Planning Attack Strategies
Introduction
Getting a list of subdomains
Fierce
DNSdumpster
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
Using Nmap to find open ports
Using scripts
Bypassing firewalls with Nmap
TCP ACK scan
TCP Window scan
Idle scan
Searching for open directories
The dirb tool
How to do it…
Performing deep magic with Dmitry
Hunting for SSL flaws
How to do it…
Exploring connections with intrace
Digging deep with theharvester
Finding the technology behind web apps
Scanning IPs with masscan
Sniffing around with Kismet
Testing routers with firewalk
Chapter 3: Vulnerability Assessment
Chapter 4: Web App Exploitation – Beyond OWASP Top 10
Chapter 5: Network Exploitation on Current Exploitation
Chapter 6: Wireless Attacks
Chapter 7: Password Attacks
Chapter 8: Buffer Overflows
Chapter 9: Software Testing
Chapter 10: Kali Linux – NetHunters and Raspberries
Chapter 12: Live Penetration Tesing Examples
Chapter 11: Writing Reports
No one beat you. Absolutely perfect! Thanks so much sir.
Good to read so many examples. Thanks
Very, very thanks to dear sir
Very, very thanks to dear sir. I really enjoyed reading your Hindi PDF book. All the logic is clear, and I hope to achieve a higher level in programming with your amazing book!
The book provides practical insights and clear examples, making complex concepts accessible. It’s a valuable resource for both beginners and experienced professionals. The author's expertise and engaging writing style ensure a comprehensive understanding.
The book is excellent, with a lot of helpful examples and clear explanations. It delves into the intricacies of the subject with depth and clarity, making complex topics easier to grasp. Each chapter builds upon the previous one, reinforcing understanding through practical applications and real-world scenarios. The author’s expertise shines through, offering invaluable insights and tips that enhance both learning and implementation. Ideal for readers at any level, this book is a must-have for anyone looking to deepen their knowledge and skills.s.
Very well written and informative. I found it very useful for my studies.
The book exceeded my expectations. Great content and easy to understand, with insightful examples and practical tips that enhance learning. It’s well-structured, engaging, and a valuable resource for mastering the subject.
This book is a must-have for anyone learning programming. Highly recommend it for its comprehensive coverage, practical exercises, and clear explanations that make complex topics approachable and engaging.!
I learned so much from this book. It's the best resource I've found for learning programming, offering in-depth insights and practical guidance.
Great work! The explanations are very thorough and easy to follow. Highly recommend this book!
The book is excellent, with a lot of helpful examples and clear explanations.
Leave a Comment