
Hacking with Kali Linux - When you don't know sh#t
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again
$0.00 for first 30 days
LIMITED TIME OFFER
$0.99/mo for the first 3 months
Offer ends April 30, 2025 at 11:59PM PT.

Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 3 months. Cancel anytime.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Buy for $3.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
-
Narrated by:
-
Virtual Voice
-
By:
-
Lyron Foster

This title uses virtual voice narration
Virtual voice is computer-generated narration for audiobooks.
About this listen
The book is written for individuals who are interested in learning about ethical hacking and have little to no experience with Kali Linux. It is also suitable for individuals who have experience with other operating systems and are interested in learning about Kali Linux.
The book is divided into eight chapters, with each chapter focusing on a specific aspect of ethical hacking. The first chapter provides an introduction to hacking, its types, ethics, and legal implications, as well as an overview of Kali Linux tools for ethical hacking. The second chapter covers the downloading and installation of Kali Linux, as well as setting up virtual environments for hacking and basic configuration of Kali Linux.
Chapters three and four cover information gathering, scanning for open ports and services, vulnerability scanning and exploitation using Kali Linux tools. Chapter five focuses on password cracking and wireless network hacking, including techniques for wireless network penetration testing.
Chapter six covers advanced hacking techniques, including exploiting web applications, social engineering, evading detection, and staying anonymous. Chapter seven delves into forensics and analysis, including techniques for forensic analysis, using Kali Linux tools for forensic analysis, recovering data from a compromised system, and analysis of logs and event data.
Finally, chapter eight covers building a secure network using Kali Linux tools, monitoring and protecting a network from attacks, and techniques for securing web applications and databases.
Throughout the book, readers are provided with examples and hypothetical scenarios to help them understand and apply the concepts covered. By the end of the book, readers will have gained a comprehensive understanding of ethical hacking using Kali Linux and will be able to apply their knowledge in real-world situations.
adbl_web_global_use_to_activate_webcro768_stickypopup