Amazon Price: $24.49 $24.49 (as of July 21, 2017 03:11 –
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This BookLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrated into the Kali Linux testing platformA step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own
Who This Book Is For
Continue reading “Kali Linux Network Scanning Cookbook”
Amazon Price: $44.99 $43.19 You save: $1.80 (4%). (as of July 21, 2017 05:04 –
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
About This BookConduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systemsCrack WEP, WPA, and even WPA2 wireless networksA hands-on guide teaching how to expose wireless security threats through the eyes of an attacker
Who This Book Is For
This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.
Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.
Continue reading “Mastering Wireless Penetration Testing for Highly-Secured Environments”
Amazon Price: $24.99 $24.99 (as of July 20, 2017 21:34 –
Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects
About This BookTurn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friendsDetect an intruder on camera and set off an alarm and also find out what the other computers on your network are up toFull of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels
Who This Book Is For
This book is an easy-to-follow guide with practical examples in each chapter. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications and also guides you through setting up the Raspberry Pi as a secret agent toolbox.
The book starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you've learned out in the real world.
Continue reading “Raspberry Pi for Secret Agents – Second Edition”
Amazon Price: $42.99 $42.99 (as of July 21, 2017 15:04 –
With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
Overview Develops Real World Approaches to Penetration testing using Metasploit Develop advanced skills to carry out effective Risk validation Develop skills to fabricate any kind of function within the Framework.
The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services.
This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.
Continue reading “Mastering Metasploit”
Amazon Price: $49.99 $39.91 You save: $10.08 (20%). (as of July 21, 2017 11:11 –
Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide
Overview Clear and concise explanations for forensic examinations of mobile devices Master the art of extracting data, recovering deleted data, bypassing screen locks, and much more The first and only guide covering practical mobile forensics on multiple platforms
With the advent of smartphones, the usage and functionality of mobile devices has grown enormously along with the sensitive information contained in these devices. Law enforcement agencies around the world have realized the importance of evidence present on a mobile device and how it can influence the outcome of an investigation.
Practical Mobile Forensics explains mobile forensic techniques on the iOS, Android, Windows, and BlackBerry platforms. You will learn the fundamentals of mobile forensics, and different techniques to extract data from a device, recover deleted data, bypass the screen lock mechanisms, and various other tools that aid in a forensic examination.
This book will teach you everything you need to know to forensically examine a mobile device. The techniques described are not only useful for budding forensic investigators, but will also come in handy for those who may want to recover accidentally deleted data.
What you will learn from this book Learn different approaches to practical mobile forensics Understand the architecture and security mechanisms present in iOS and Android platforms Identify sensitive files on iOS and Android platforms Set up the forensic environment Extract data on iOS and Android platforms Recover data on iOS and Android platforms Understand the forensics of Windows and BlackBerry devices
The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics.
Who this book is written for
If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.