可用稳定的Kali版本,搭建好学习安全技术的环境。系统自带一系列常用的攻击工具,aircrack-ng、reaver等等。
2019-12-21 20:14:11 66B Kali image crack
1
包含Kali的全套学习资料,可以帮助做渗透分析,网络安全的人提供从入门到精通的全部资源!
2019-12-21 20:10:18 116B Kali 入门到精通 网络安全 渗透分析
1
Kali Linux是基于Debian的Linux发行版,设计用于数字取证和渗透测试。而Kali Linux发行版今年迎来了其诞生十周年。作为极具人气的开源项目,由Offensive Security负责维护的Kali Linux日前宣布将在2017年的美国黑帽大会上发布全新Kali Linux认证专家(简称KLCP)
2019-12-21 19:56:16 67B kali 渗透测试 安全牛
1
kali系统中文版官方手册 kali-book-zh-hans 官网翻译,分享一下
2019-12-21 19:53:53 7.65MB kali
1
kali linux 的pdf版文档教程,书从kali linux 系统的安装讲起,完整的渗透测试流程和kali的各种工具都有介绍,适合入门kali和想深入研究的学习者
2019-12-21 19:37:17 22.35MB kali linux dxb
1
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book Description Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web p
2019-12-21 18:57:02 15.87MB web penetration testing kali
1
作者:Gilberto Najera-Gutierrez译者:飞龙 协议:CC BY-NC-SA 4.0 我们会涉及如何准备我们的 Kali 以便能够遵循这本书中的秘籍,并使用虚拟机建立带有存在漏洞的 Web 应用的实验室。
2019-12-21 18:53:40 24.53MB kali-linux
1
Kali Web Linux cookbook
2017-11-23 23:50:24 13.27MB Kali Web Linux cookbook
1