Nouveauté

Linux For Hackers: Getting Started with Networking, WiFi Hacking, and Python Scripting

Par : Fastskill
Actuellement indisponible
Cet article est actuellement indisponible, il ne peut pas être commandé sur notre site pour le moment. Nous vous invitons à vous inscrire à l'alerte disponibilité, vous recevrez un e-mail dès que cet ouvrage sera à nouveau disponible.
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN8231618873
  • EAN9798231618873
  • Date de parution26/07/2025
  • Protection num.pas de protection
  • Infos supplémentairesepub
  • ÉditeurWalzone Press

Résumé

In this book, you'll start with the basics of Linux and networking, then move into Wi-Fi hacking, password cracking, Python scripting, reverse shells, and securing your system. You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use. What You'll Learn:Networking Basics·       Learn Essential Commands.·       Tshark Commands to Monitor Networks.·       Capture Usernames and Passwords with Tshark.
Wi-Fi Hacking·       Test your Wireless Adapter for Hacking Compatibility.·       Perform a Denial of Service Attack on a Wireless Network.·       Crack Wi-Fi Passwords using Hashcat.·       Create a Fake Captive Portal Login Page. Password Attacks·       Crack Password Hashes using Hashcat and John the Ripper.·       Crack Password-Protected ZIP Files.·       Bypass Windows Passwords using Kali Linux. Python Scripting·       Build a Network Scanner and FTP Cracker.·       Create a Keylogger using Python.·       Build and Customize Wordlists.·       Automate Wi-Fi Attacks with Python.·       Create a Fake Captive Portal with Flask.
Reverse Shells·       Understand how Reverse Shells Work.·       Build them using Python and Metasploit.·       Detect and Block them on Linux Systems. Security·       Encrypt and Decrypt Files with GPG.·       Hide Secret Data Inside an Image.·       Detect Malicious Wi-Fi Attacks with Wireshark.·       Protect your Wi-Fi from Brute-Force Attacks.·       Monitor System Logs for Suspicious Activity. By the end of this book, you'll be confident using Linux for ethical hacking.
With practical examples and no fluff, this book helps you build skills that you can use in real-life situations. I 'm not responsible for what you do with this book. The content is for ETHICAL HACKING educational purposes only, not intended for malicious intent.   
In this book, you'll start with the basics of Linux and networking, then move into Wi-Fi hacking, password cracking, Python scripting, reverse shells, and securing your system. You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use. What You'll Learn:Networking Basics·       Learn Essential Commands.·       Tshark Commands to Monitor Networks.·       Capture Usernames and Passwords with Tshark.
Wi-Fi Hacking·       Test your Wireless Adapter for Hacking Compatibility.·       Perform a Denial of Service Attack on a Wireless Network.·       Crack Wi-Fi Passwords using Hashcat.·       Create a Fake Captive Portal Login Page. Password Attacks·       Crack Password Hashes using Hashcat and John the Ripper.·       Crack Password-Protected ZIP Files.·       Bypass Windows Passwords using Kali Linux. Python Scripting·       Build a Network Scanner and FTP Cracker.·       Create a Keylogger using Python.·       Build and Customize Wordlists.·       Automate Wi-Fi Attacks with Python.·       Create a Fake Captive Portal with Flask.
Reverse Shells·       Understand how Reverse Shells Work.·       Build them using Python and Metasploit.·       Detect and Block them on Linux Systems. Security·       Encrypt and Decrypt Files with GPG.·       Hide Secret Data Inside an Image.·       Detect Malicious Wi-Fi Attacks with Wireshark.·       Protect your Wi-Fi from Brute-Force Attacks.·       Monitor System Logs for Suspicious Activity. By the end of this book, you'll be confident using Linux for ethical hacking.
With practical examples and no fluff, this book helps you build skills that you can use in real-life situations. I 'm not responsible for what you do with this book. The content is for ETHICAL HACKING educational purposes only, not intended for malicious intent.