The Cyberwarrior Handbook

by OccupyTheWeb
The Cyberwarrior Handbook
  • ISBN-13: 9781718502284
  • Author(s): OccupyTheWeb
  • Subject: Computer programming / software development
  • Publisher: Penguin Random House Group
  • Imprint: No Starch Press
  • Publication Date: 14-11-2013
  • Format: p/b

Availability: Not yet available

£47.99
Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools, techniques, and tricks from a veteran with 20 years experience in the field. Hacking and cybersecurity are the most important skillsets of the 21st century. This thorough introduction by world-famous hacker OccupytheWeb teaches aspiring cyberwarriors the essential knowledge and tools they need to get started in the craft. The book begins by showing readers how to set up a test lab with Kali Linux, the best operating system for hacking, and a Windows virtual environment for safely practicing techniques in real time. Each chapter focuses on a fundamental skill or method, like performing passive and active reconnaissance, cracking passwords, scanning for vulnerabilities with popular tools like nmap, spying on internet traffic with Wireshark, and using the Metasploit framework to exploit bugs and stealthily drop malicious payloads. Learn how
About the book

Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools, techniques, and tricks from a veteran with 20 years experience in the field. Hacking and cybersecurity are the most important skillsets of the 21st century. This thorough introduction by world-famous hacker OccupytheWeb teaches aspiring cyberwarriors the essential knowledge and tools they need to get started in the craft. The book begins by showing readers how to set up a test lab with Kali Linux, the best operating system for hacking, and a Windows virtual environment for safely practicing techniques in real time. Each chapter focuses on a fundamental skill or method, like performing passive and active reconnaissance, cracking passwords, scanning for vulnerabilities with popular tools like nmap, spying on internet traffic with Wireshark, and using the Metasploit framework to exploit bugs and stealthily drop malicious payloads. Learn how

Books by this Author