Learning ParrotOS: Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system
商品資訊
ISBN13:9788198431691
出版社:INGSPARK
作者:Arvin Destar
出版日:2024/12/30
裝訂:平裝
規格:23.5cm*19.1cm*0.9cm (高/寬/厚)
商品簡介
As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.
You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.
Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.
Use bash scripting to automate and streamline penetration testing workflows.
Manage files and directories using command-line tools like rsync, grep, and awk.
Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.
Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.
Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.
Perform robust password audits and recover weak credentials using John the Ripper.
Test wireless networks using Aircrack-ng in WEP and WPA protocols.
Leverage pivoting techniques across compromised networks.
Integrate automated recon and scanning for continuous network monitoring.
Table of ContentGetting Started with Parrot OS
Up and Running with Parrot OS
System Configuration and Customization
Mastering Command-Line Utilities
Leveraging Parrot OS Security Tools
Conducting Network Reconnaissance
Exploiting Vulnerabilities with Metasploit
Advanced Web Application Testing
Implementing Sniffing and Tunneling
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

