Modsecurity Handbook

Download Modsecurity Handbook PDF Online Free

Author :
Publisher : Feisty Duck
ISBN 13 : 1907117024
Total Pages : 365 pages
Book Rating : 4.9/5 (71 download)

DOWNLOAD NOW!


Book Synopsis Modsecurity Handbook by : Ivan Ristic

Download or read book Modsecurity Handbook written by Ivan Ristic and published by Feisty Duck. This book was released on 2010 with total page 365 pages. Available in PDF, EPUB and Kindle. Book excerpt: "ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristić, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. ... The official ModSecurity Reference Manual is included in the second part of the book."--Back cover.

Modsecurity Handbook, Second Edition

Download Modsecurity Handbook, Second Edition PDF Online Free

Author :
Publisher : Feisty Duck
ISBN 13 : 9781907117077
Total Pages : 454 pages
Book Rating : 4.1/5 (17 download)

DOWNLOAD NOW!


Book Synopsis Modsecurity Handbook, Second Edition by : Christian Folini

Download or read book Modsecurity Handbook, Second Edition written by Christian Folini and published by Feisty Duck. This book was released on 2017-07-15 with total page 454 pages. Available in PDF, EPUB and Kindle. Book excerpt: ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity's original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack. Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today. ModSecurity Handbook covers the following topics, which will help anyone with a web site to run: Installation and configuration of ModSecurity Detailed guide to writing rules IP address, session, and user tracking Session management hardening Whitelisting, blacklisting, and IP reputation management Anomaly scoring and advanced blocking strategies Integration with other Apache modules Working with predefined rule sets Virtual patching and content injection Performance considerations Writing rules in Lua and extending ModSecurity in C Detailed coverage of ModSecurity's numerous directives, variables, transformations, and operators The book is suitable for all reader levels: It takes newcomers by the hand to turn them into seasoned users, while seasoned users will learn advanced techniques from the top experts on the subject and find hidden clues to master the rule language. An updated ModSecurity Reference Manual is included in the second part of the book. ABOUT THE AUTHORS Dr. Christian Folini is a twelve-year veteran of ModSecurity. He is a renowned speaker, teacher, and system engineer who has specialized in securing high-profile web servers. Christian is one of the leaders of the OWASP ModSecurity Core Rule Set project, a key member of the ModSecurity community, program chair of the Swiss Cyber Storm conference, and vice president of Swiss Cyber Experts (a public-private partnership). Ivan Ristic is a security researcher, engineer, and author, known especially for his contributions to the web application firewall field and development of ModSecurity, an open source web application firewall, and for his SSL/TLS and PKI research, tools and guides published on the SSL Labs web site. His latest project, Hardenize, is a security posture analysis service that makes security fun again. He is the author of three books, Apache Security, ModSecurity Handbook, and Bulletproof SSL and TLS.

Web Application Defender's Cookbook

Download Web Application Defender's Cookbook PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118417054
Total Pages : 563 pages
Book Rating : 4.1/5 (184 download)

DOWNLOAD NOW!


Book Synopsis Web Application Defender's Cookbook by : Ryan C. Barnett

Download or read book Web Application Defender's Cookbook written by Ryan C. Barnett and published by John Wiley & Sons. This book was released on 2013-01-04 with total page 563 pages. Available in PDF, EPUB and Kindle. Book excerpt: Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each "recipe" shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more. Provides practical tactics for detecting web attacks and malicious behavior and defending against them Written by a preeminent authority on web application firewall technology and web application defense tactics Offers a series of "recipes" that include working code examples for the open-source ModSecurity web application firewall module Find the tools, techniques, and expert information you need to detect and respond to web application attacks with Web Application Defender's Cookbook: Battling Hackers and Protecting Users.

CMS Security Handbook

Download CMS Security Handbook PDF Online Free

Author :
Publisher : John Wiley and Sons
ISBN 13 : 1118091760
Total Pages : 432 pages
Book Rating : 4.1/5 (18 download)

DOWNLOAD NOW!


Book Synopsis CMS Security Handbook by : Tom Canavan

Download or read book CMS Security Handbook written by Tom Canavan and published by John Wiley and Sons. This book was released on 2011-03-31 with total page 432 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn to secure Web sites built on open source CMSs Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you’re responsible for one of them, this comprehensive security guide, the first of its kind, offers detailed guidance to help you prevent attacks, develop secure CMS-site operations, and restore your site if an attack does occur. You’ll learn a strong, foundational approach to CMS operations and security from an expert in the field. More and more Web sites are being built on open source CMSs, making them a popular target, thus making you vulnerable to new forms of attack This is the first comprehensive guide focused on securing the most common CMS platforms: Joomla!, WordPress, Drupal, and Plone Provides the tools for integrating the Web site into business operations, building a security protocol, and developing a disaster recovery plan Covers hosting, installation security issues, hardening servers against attack, establishing a contingency plan, patching processes, log review, hack recovery, wireless considerations, and infosec policy CMS Security Handbook is an essential reference for anyone responsible for a Web site built on an open source CMS.

OpenSSL Cookbook

Download OpenSSL Cookbook PDF Online Free

Author :
Publisher : Feisty Duck
ISBN 13 : 1907117059
Total Pages : 62 pages
Book Rating : 4.9/5 (71 download)

DOWNLOAD NOW!


Book Synopsis OpenSSL Cookbook by : Ivan Ristic

Download or read book OpenSSL Cookbook written by Ivan Ristic and published by Feisty Duck. This book was released on 2013-10-03 with total page 62 pages. Available in PDF, EPUB and Kindle. Book excerpt: A guide to the most frequently used OpenSSL features and commands, written by Ivan Ristic. Comprehensive coverage of OpenSSL installation, configuration, and key and certificate management Includes SSL/TLS Deployment Best Practices, a design and deployment guide Written by a well-known practitioner in the field and the author of SSL Labs and the SSL/TLS configuration assessment tool Available in a variety of digital formats (PDF, EPUB, Mobi/Kindle); no DRM Continuously updated OpenSSL Cookbook is built around one chapter from Bulletproof SSL/TLS and PKI, a larger work that provides complete coverage of SSL/TLS and PKI topics. To download your free copy in various formats, visit feistyduck.com/books/openssl-cookbook/

Bulletproof SSL and TLS

Download Bulletproof SSL and TLS PDF Online Free

Author :
Publisher : Feisty Duck
ISBN 13 : 1907117040
Total Pages : 528 pages
Book Rating : 4.9/5 (71 download)

DOWNLOAD NOW!


Book Synopsis Bulletproof SSL and TLS by : Ivan Ristic

Download or read book Bulletproof SSL and TLS written by Ivan Ristic and published by Feisty Duck. This book was released on 2014 with total page 528 pages. Available in PDF, EPUB and Kindle. Book excerpt: Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

Apache Security

Download Apache Security PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 440 pages
Book Rating : 4.3/5 (91 download)

DOWNLOAD NOW!


Book Synopsis Apache Security by : Ivan Ristic

Download or read book Apache Security written by Ivan Ristic and published by . This book was released on 2005 with total page 440 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The complete guide to securing your Apache web server"--Cover.

ModSecurity 2.5

Download ModSecurity 2.5 PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1847194753
Total Pages : 416 pages
Book Rating : 4.8/5 (471 download)

DOWNLOAD NOW!


Book Synopsis ModSecurity 2.5 by : Magnus Mischel

Download or read book ModSecurity 2.5 written by Magnus Mischel and published by Packt Publishing Ltd. This book was released on 2009-11-23 with total page 416 pages. Available in PDF, EPUB and Kindle. Book excerpt: Prevent web application hacking with this easy to use guide.

Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications

Download Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9813343702
Total Pages : 499 pages
Book Rating : 4.8/5 (133 download)

DOWNLOAD NOW!


Book Synopsis Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications by : Tran Khanh Dang

Download or read book Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications written by Tran Khanh Dang and published by Springer Nature. This book was released on 2020-11-19 with total page 499 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, held in Quy Nhon, Vietnam, in November 2020.* The 29 full papers and 8 short were carefully reviewed and selected from 161 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; data analytics and healthcare systems; machine learning-based big data processing; emerging data management systems and applications; and short papers: security and data engineering. * The conference was held virtually due to the COVID-19 pandemic.

Cyber Operations

Download Cyber Operations PDF Online Free

Author :
Publisher : Apress
ISBN 13 : 1484242947
Total Pages : 1151 pages
Book Rating : 4.4/5 (842 download)

DOWNLOAD NOW!


Book Synopsis Cyber Operations by : Mike O'Leary

Download or read book Cyber Operations written by Mike O'Leary and published by Apress. This book was released on 2019-03-01 with total page 1151 pages. Available in PDF, EPUB and Kindle. Book excerpt: Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What You’ll Learn Construct a testing laboratory to experiment with software and attack techniquesBuild realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla!Manage networks remotely with tools, including PowerShell, WMI, and WinRMUse offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the RipperExploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanismsDefend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls Who This Book Is For This study guide is intended for everyone involved in or interested in cybersecurity operations (e.g., cybersecurity professionals, IT professionals, business professionals, and students)

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Download Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000846717
Total Pages : 279 pages
Book Rating : 4.0/5 (8 download)

DOWNLOAD NOW!


Book Synopsis Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence by : Yassine Maleh

Download or read book Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence written by Yassine Maleh and published by CRC Press. This book was released on 2023-04-28 with total page 279 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, big data analytics and machine intelligencebased techniques can be used. This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat intelligence CTI and key data to advance the mission of anticipating, prohibiting, preventing, preparing, and responding to internal security. The wide variety of topics it presents offers readers multiple perspectives on various disciplines related to big data analytics and intelligent systems for cyber threat intelligence applications. Technical topics discussed in the book include: • Big data analytics for cyber threat intelligence and detection • Artificial intelligence analytics techniques • Real-time situational awareness • Machine learning techniques for CTI • Deep learning techniques for CTI • Malware detection and prevention techniques • Intrusion and cybersecurity threat detection and analysis • Blockchain and machine learning techniques for CTI

How to Accelerate Your Internet

Download How to Accelerate Your Internet PDF Online Free

Author :
Publisher : Lulu.com
ISBN 13 : 0977809315
Total Pages : 315 pages
Book Rating : 4.9/5 (778 download)

DOWNLOAD NOW!


Book Synopsis How to Accelerate Your Internet by : Rob Flickenger

Download or read book How to Accelerate Your Internet written by Rob Flickenger and published by Lulu.com. This book was released on 2006-10-01 with total page 315 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Effective Cybersecurity

Download Effective Cybersecurity PDF Online Free

Author :
Publisher : Addison-Wesley Professional
ISBN 13 : 0134772954
Total Pages : 1080 pages
Book Rating : 4.1/5 (347 download)

DOWNLOAD NOW!


Book Synopsis Effective Cybersecurity by : William Stallings

Download or read book Effective Cybersecurity written by William Stallings and published by Addison-Wesley Professional. This book was released on 2018-07-20 with total page 1080 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.

NGINX Cookbook

Download NGINX Cookbook PDF Online Free

Author :
Publisher : "O'Reilly Media, Inc."
ISBN 13 : 1492078433
Total Pages : 188 pages
Book Rating : 4.4/5 (92 download)

DOWNLOAD NOW!


Book Synopsis NGINX Cookbook by : Derek DeJonghe

Download or read book NGINX Cookbook written by Derek DeJonghe and published by "O'Reilly Media, Inc.". This book was released on 2020-10-28 with total page 188 pages. Available in PDF, EPUB and Kindle. Book excerpt: NGINX is one of the most widely used web servers available today, in part because of its capabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This cookbook provides easy-to-follow examples to real-world problems in application delivery. The practical recipes will help you set up and use either the open source or commercial offering to solve problems in various use cases. For professionals who understand modern web architectures, such as n-tier or microservice designs, and common web protocols including TCP and HTTP, these recipes provide proven solutions for security, software load balancing, and monitoring and maintaining NGINX’s application delivery platform. You’ll also explore advanced features of both NGINX and NGINX Plus, the free and licensed versions of this server. You’ll find recipes for: High-performance load balancing with HTTP, TCP, and UDP Securing access through encrypted traffic, secure links, HTTP authentication subrequests, and more Deploying NGINX to Google Cloud, AWS, and Azure cloud computing services Setting up and configuring NGINX Controller Installing and configuring the NGINX Plus App Protect module Enabling WAF through Controller ADC

Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Download Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications PDF Online Free

Author :
Publisher : Feisty Duck
ISBN 13 : 9781907117091
Total Pages : 512 pages
Book Rating : 4.1/5 (17 download)

DOWNLOAD NOW!


Book Synopsis Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by : Ivan Ristic

Download or read book Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications written by Ivan Ristic and published by Feisty Duck. This book was released on 2022-01-10 with total page 512 pages. Available in PDF, EPUB and Kindle. Book excerpt: Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version For IT professionals, help to understand security risks For system administrators, help to deploy systems securely For developers, help to secure web applications Practical and concise, with added depth as needed Introduction to cryptography and the Internet threat model Coverage of TLS 1.3 as well as earlier protocol versions Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority Guide to using OpenSSL to test servers for vulnerabilities This book is also available in a variety of digital formats directly from the publisher. Visit us at www.feistyduck.com.

In Depth Security Vol. III

Download In Depth Security Vol. III PDF Online Free

Author :
Publisher : BoD – Books on Demand
ISBN 13 : 3981770048
Total Pages : 210 pages
Book Rating : 4.9/5 (817 download)

DOWNLOAD NOW!


Book Synopsis In Depth Security Vol. III by : Stefan Schumacher

Download or read book In Depth Security Vol. III written by Stefan Schumacher and published by BoD – Books on Demand. This book was released on 2019-11-04 with total page 210 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Kali Linux - An Ethical Hacker's Cookbook

Download Kali Linux - An Ethical Hacker's Cookbook PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1787120287
Total Pages : 366 pages
Book Rating : 4.7/5 (871 download)

DOWNLOAD NOW!


Book Synopsis Kali Linux - An Ethical Hacker's Cookbook by : Himanshu Sharma

Download or read book Kali Linux - An Ethical Hacker's Cookbook written by Himanshu Sharma and published by Packt Publishing Ltd. This book was released on 2017-10-17 with total page 366 pages. Available in PDF, EPUB and Kindle. Book excerpt: Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.