Jump to ratings and reviews
Rate this book

Computer Hacking: 2 Books in 1: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking with Kali Linux with Basic Security Testing

Rate this book
2 Manuscripts in 1 Book If you want to learn the art of hacking, then keep reading...

This book set

Book 1)   Hacking tools for  A Complete Overview on Linux, Including Linux Mint, the First Notions of Linux for Beginners and Kali Linux Tools

Book 2)   Hacking with Kali The Complete Guide on Kali Linux for Beginners and Hacking Tools. Includes Basic Security Testing with Kali Linux.

The first book explains about the Installation procedures of kali Linux. A detailed description on Linux commands is given along with many examples that will help us understand the techniques we need to master. Along with a brief introduction of kali Linux, this book will explain us about tools like Nmap an information-gathering tool and Metasploit an exploit creation tool.  A chapter in this book deals solely about Wireless Hacking with many examples.

The second book explains Hacking using an operating system that is created for this sole KALI LINUX. We start with an introduction to the world of hacking along with a lot of examples and processes that hackers use in their real life testing methods. As a hacker, one needs to understand basic Linux commands along with bash and python scripting. This book has provided a lot of bash and python examples that will make you start with the hacking scripting. We have also discussed about Network management, process management and several other parts of Linux architecture in detail.  In the last chapter, we have made a whole new strategy to attack web using Burp suite an important kali Linux tool.

Below we explain the most exciting parts of the book set.Introduction to Linux Operating SystemInstallation of Linux Mint and Kali LinuxInstallation of Linux Distributions using a virtual machineIntroduction to Linux CommandsExplaining about hacking tools in Kali LinuxInformation gathering of the target using NmapAutomatic vulnerability assessment using NessusGetting introduced to Netcat utility with a lot of examplesNotes on using password cracking toolsIntroduction to John the RipperIntroduction to Snort toolA whole chapter dealing about wireless hacking with a lot of examplesHacking process along with clear instructions. This is more like a starting tip for the beginner hackersInstallation of virtual machine VM ware and Installation of kali Linux in detail.Bash scripting with many examples. We will explain variables, conditionals and looping in Bash scripting.Python scripting with many examples. We will explain variables, classes, objects in python scripting.Network management and a lot of methods to spoof addressesProcess management along with examples. We give so many methodologies to kill a process and prioritizing processes.

340 pages, Kindle Edition

Published September 4, 2019

8 people are currently reading
10 people want to read

About the author

ICT School

6 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
1 (50%)
3 stars
1 (50%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.