
Hacked
Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Jack Ares
-
De:
-
Alan T. Norman
Acerca de esta escucha
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity.
The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks.
Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
Get answers from an experienced IT expert to every single question you have related to the learning you do in this audiobook including:
- installing Kali Linux
- using VirtualBox
- basics of Linux
- Staying anonymous with Tor
- Proxychains, Virtual Private Networks (VPN)
- Macchanger, Nmap
- cracking wifi
- aircrack
- cracking Linux passwords
What are the requirements?
- Reliable and fast internet connection.
- Wireless networking card.
- Kali Linux Distribution
- Basic IT skills
What will you get from the hacking audiobook?
- Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
- You will learn the basics of network
- Deal with a lot of Kali Linux tools
- Learn some Linux commands
- Tips for remaining anonymous in hacking and penetration testing activities.
- Protect your WiFi network against all the attacks
- Gain access to any client account in the WiFi network
- A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
- Step-by-step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.
Los oyentes también disfrutaron...
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- De: Alan T. Norman
- Narrado por: Jack Ares
- Duración: 1 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
-
I had to jump back and forth.
- De HyPEAe en 05-16-20
De: Alan T. Norman
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- De: Abraham K White
- Narrado por: Dalan E Decker
- Duración: 5 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
-
Good
- De Mrs. Beautiful en 07-24-19
De: Abraham K White
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Permanent Record
- De: Edward Snowden
- Narrado por: Holter Graham
- Duración: 11 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- De Ryan L en 09-22-19
De: Edward Snowden
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- De: Alan T. Norman
- Narrado por: Jack Ares
- Duración: 1 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
-
I had to jump back and forth.
- De HyPEAe en 05-16-20
De: Alan T. Norman
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- De: Abraham K White
- Narrado por: Dalan E Decker
- Duración: 5 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
-
Good
- De Mrs. Beautiful en 07-24-19
De: Abraham K White
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Permanent Record
- De: Edward Snowden
- Narrado por: Holter Graham
- Duración: 11 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- De Ryan L en 09-22-19
De: Edward Snowden
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De: Joseph Menn
- Narrado por: Jonathan Davis
- Duración: 8 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- De Sam Kopp en 12-18-19
De: Joseph Menn
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- De: Learn Computer Hacking in Deep
- Narrado por: Jowanna Lewis
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
-
KLCP TRAINING
- De Suwan Lechowicz en 03-16-20
-
Programming for Beginners: 2 Book in 1
- Linux for Beginners, SQL for Beginners
- De: Matthew Python
- Narrado por: Charles Young
- Duración: 6 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
Linux is quite synonymous with the cloud. If you intend to work on cloud-based projects, it is always good to learn Linux, especially the essentials. SQL is one of the most famous database query languages that have taken over almost three-fourths of the internet. Learning SQL is a must for any developer nowadays, and with the help of a good book, one can understand the basics very well.
De: Matthew Python
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- De: David James Carmack
- Narrado por: Ivan Busenius
- Duración: 3 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Linux for Beginners: The Ultimate Crash Course
- Computer Programming, Book 1
- De: Mark Solomon Brown
- Narrado por: Kevin Liang
- Duración: 3 h y 24 m
- Versión completa
-
General
-
Narración:
-
Historia
Do you need a hands-on crash course in Linux programming? Look no further! You have found your audiobook! Everything you need is within the covers of Linux for Beginners: The Ultimate Crash Course! Linux programming is an advanced skill, but building on your foundations, you will learn more from Linux for Beginners: The Ultimate Crash Course in one day than you can anywhere else. Whether you are a self-taught programmer or you are working your way through school for a degree in information technology, leaning Linux and learning it well is essential.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- De: Anthony Hack
- Narrado por: Robert Plank
- Duración: 3 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
De: Anthony Hack
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- De: Adesh Silva
- Narrado por: Mitchell Reuter
- Duración: 3 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
Did you know that coding and programming jobs are one of the most secure and best-paid jobs around the world? According to BSL, the median annual wage for computer programmers was $84,280 in 2018. The field is growing strong and companies are headhunting coders. But even if you don't want to become a professional coder, programming skills increase your salary in other fields such as marketing, finance, and business analysis. Several studies have shown that programming skills added more than $20,000 to the annual salary.
-
-
Such an amazing audio-book.
- De Warren Peace en 03-23-20
De: Adesh Silva
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- De: Anthony Hack
- Narrado por: Jordan Gunner
- Duración: 3 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
De: Anthony Hack
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- De: Erick Stack
- Narrado por: Clay Bel le Fort
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
De: Erick Stack
-
Kubernetes
- A Step-by-Step Guide for Beginners to Build, Manage, Develop, and Intelligently Deploy Applications by Using Kubernetes (2020 Edition)
- De: Sheldon Miles
- Narrado por: Aaron Miller
- Duración: 3 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Kubernetes has established itself as one of the leading hosts of cloud-based applications. This open-sourced management system for containers has surged considerably in the past few years and only continues to grow. You could even think of it as one of the biggest success stories in open-source environments. This book will act as your guide to this world, explaining concepts and getting you acclimated to various commands and codes, so you can gain insight into the working of Kubernetes.
-
-
This is so great book
- De Charlotte en 05-09-20
De: Sheldon Miles
Lo que los oyentes dicen sobre Hacked
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Warren
- 10-10-19
Great book
The book concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Thanks Alan T. Norman!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Mark
- 10-08-19
Well Done
This manual will make your understanding obvious through all around mentioned offered course , to make Learning fundamental.The writer gives an outline of how to get ready bootable media and introduce the software.Very clear and with genuine guides to find out pretty much every one of the stunts and clarifications about hacking with Kali Linux and Wireless Hacking. This book is astounding. I slanted such epic measures of feasible things from this book. I adore this book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- William
- 10-08-19
Incredible book!
I got the book with an interest in learning the basics of Kali Linux penetration testing and I finished the book with an eagerness to learn more about pen testing and other advanced techniques. It takes the new user through what penetration testing is and why it is needed; but also has some information for those already doing testing, as well as other resources they may need.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Robert
- 10-08-19
Nice book
The teacher ( Alan ) knows the subject matter. He is the first person who taught subletting to my understanding. Very detailed and precise instructions Kali Linux. Really enjoyed it. I feel more comfortable with this knowledge. Really a great read! I like the way this book looked. perfect sense and probably the most helpful part of the Guide to Learn Kali Linux Step by Step book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Marcus
- 10-10-19
Well worth!
I purchased this book to help me learn how to use Kali Linux, and so far I am extremely pleased with the material. I am definitely going to be purchasing more from this author because the book explains very well how to use the various programs that are featured in Kali Linux.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Richard
- 10-08-19
Recommended!
This book is astounding. I slanted such huge measures of practical things from this book. I adore this book. I was truly worth investigating this book. This book remarkable reason most of these books tips are incredibly valuable. I would prescribe this book to anyone. Whatever by virtue of essayist and must be recommended for this book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Barney
- 10-10-19
A complete tutorial explaining how to build a virt
A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords, VirtualBox , network, WiFi network against all the attacks! So you will know everything !! Great!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña