📦Darmowa dostawa od 69 zł - do Żabki oraz automatów i punktów DPD! Przy mniejszych zamówieniach zapłacisz jedynie 4,99 zł!🚚
Darmowa dostawa od 69,00 zł
Learning ParrotOS - Destar Arvin

Learning ParrotOS - Destar Arvin

  • Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system

As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.

You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.

Key Learnings

Install, configure and customize ParrrotOS for ethical hacking and pentesting tasks.

Use bash scripting to automate and streamline penetration testing workflows.

Manage files and directories using command-line tools like rsync, grep, and awk.

Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.

Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.

Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.

Perform robust password audits and recover weak credentials using John the Ripper.

Test wireless networks using Aircrack-ng in WEP and WPA protocols.

Leverage pivoting techniques across compromised networks.

Integrate automated recon and scanning for continuous network monitoring.

Table of Content

Getting Started with Parrot OS

Up and Running with Parrot OS

System Configuration and Customization

Mastering Command-Line Utilities

Leveraging Parrot OS Security Tools

Conducting Network Reconnaissance

Exploiting Vulnerabilities with Metasploit

Advanced Web Application Testing

Implementing Sniffing and Tunneling



EAN: 9788198431691
Symbol
792HDM03527KS
Rok wydania
2024
Strony
172
Oprawa
Miekka
Format
19.1x23.5cm
Język
angielski
Więcej szczegółów
Bez ryzyka
14 dni na łatwy zwrot
Szeroki asortyment
ponad milion pozycji
Niskie ceny i rabaty
nawet do 50% każdego dnia
287,56 zł
/ szt.
Najniższa cena z 30 dni przed obniżką: / szt.
Cena regularna: / szt.
Możesz kupić także poprzez:
Do darmowej dostawy brakuje69,00 zł
Najtańsza dostawa 0,00 złWięcej
14 dni na łatwy zwrot
Bezpieczne zakupy
Kup teraz i zapłać za 30 dni jeżeli nie zwrócisz
Kup teraz, zapłać później - 4 kroki
Przy wyborze formy płatności, wybierz PayPo.PayPo - kup teraz, zapłać za 30 dni
PayPo opłaci twój rachunek w sklepie.
Na stronie PayPo sprawdź swoje dane i podaj pesel.
Po otrzymaniu zakupów decydujesz co ci pasuje, a co nie. Możesz zwrócić część albo całość zamówienia - wtedy zmniejszy się też kwota do zapłaty PayPo.
W ciągu 30 dni od zakupu płacisz PayPo za swoje zakupy bez żadnych dodatkowych kosztów. Jeśli chcesz, rozkładasz swoją płatność na raty.
Ten produkt nie jest dostępny w sklepie stacjonarnym
Symbol
792HDM03527KS
Kod producenta
9788198431691
Rok wydania
2024
Strony
172
Oprawa
Miekka
Format
19.1x23.5cm
Język
angielski
Autorzy
Destar Arvin

As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.

You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.

Key Learnings

Install, configure and customize ParrrotOS for ethical hacking and pentesting tasks.

Use bash scripting to automate and streamline penetration testing workflows.

Manage files and directories using command-line tools like rsync, grep, and awk.

Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.

Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.

Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.

Perform robust password audits and recover weak credentials using John the Ripper.

Test wireless networks using Aircrack-ng in WEP and WPA protocols.

Leverage pivoting techniques across compromised networks.

Integrate automated recon and scanning for continuous network monitoring.

Table of Content

Getting Started with Parrot OS

Up and Running with Parrot OS

System Configuration and Customization

Mastering Command-Line Utilities

Leveraging Parrot OS Security Tools

Conducting Network Reconnaissance

Exploiting Vulnerabilities with Metasploit

Advanced Web Application Testing

Implementing Sniffing and Tunneling



EAN: 9788198431691
Potrzebujesz pomocy? Masz pytania?Zadaj pytanie a my odpowiemy niezwłocznie, najciekawsze pytania i odpowiedzi publikując dla innych.
Zapytaj o produkt
Jeżeli powyższy opis jest dla Ciebie niewystarczający, prześlij nam swoje pytanie odnośnie tego produktu. Postaramy się odpowiedzieć tak szybko jak tylko będzie to możliwe. Dane są przetwarzane zgodnie z polityką prywatności. Przesyłając je, akceptujesz jej postanowienia.
Napisz swoją opinię
Twoja ocena:
5/5
Dodaj własne zdjęcie produktu:
Prawdziwe opinie klientów
4.8 / 5.0 13762 opinii
pixel