-
Notifications
You must be signed in to change notification settings - Fork 1
/
Kali Linux Revealed.json
1 lines (1 loc) · 30.1 KB
/
Kali Linux Revealed.json
1
{'kind': 'books#volumes', 'totalItems': 8, 'items': [{'kind': 'books#volume', 'id': '0EkrEAAAQBAJ', 'etag': '20rx/GbLYWM', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/0EkrEAAAQBAJ', 'volumeInfo': {'title': 'Kali Linux Penetration Testing Bible', 'authors': ['Gus Khawaja'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2021-04-21', 'description': 'Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781119719649'}, {'type': 'ISBN_10', 'identifier': '111971964X'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 512, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=0EkrEAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=0EkrEAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=0EkrEAAAQBAJ&pg=PA92&dq=title:Kali+Linux+Revealed&hl=&cd=1&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=0EkrEAAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=0EkrEAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 25.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 25.99, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=0EkrEAAAQBAJ&rdid=book-0EkrEAAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 25990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 25990000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Kali_Linux_Penetration_Testing_Bible-sample-pdf.acsm?id=0EkrEAAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=0EkrEAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Country Two-letter country <b>name</b> Country:CA City City <b>name</b> City:Montreal hostname Domain <b>name</b> Hostname: "domain-<b>name</b>.com" Server Server <b>name</b> Server: "<b>Linux</b>" http.<b>title</b> Web page <b>title</b> http.<b>title</b>:“Dashboard” You can check out some ...'}}, {'kind': 'books#volume', 'id': 'H6a-DwAAQBAJ', 'etag': 'IZZrJsHBv1c', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/H6a-DwAAQBAJ', 'volumeInfo': {'title': 'Learn Kali Linux 2019', 'subtitle': 'Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark', 'authors': ['Glen D. Singh'], 'publisher': 'Packt Publishing Ltd', 'publishedDate': '2019-11-14', 'description': 'Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key FeaturesGet up and running with Kali Linux 2019.2Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacksLearn to use Linux commands in the way ethical hackers do to gain control of your environmentBook Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects. Through real-world examples, you’ll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you’ll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you’ll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You’ll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment. By the end of this book, you’ll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learnExplore the fundamentals of ethical hackingLearn how to install and configure Kali LinuxGet up to speed with performing wireless network pentestingGain insights into passive and active information gatheringUnderstand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attackWho this book is for If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you’re simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781789612622'}, {'type': 'ISBN_10', 'identifier': '1789612624'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 550, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.3.3.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=H6a-DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=H6a-DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=H6a-DwAAQBAJ&pg=PA456&dq=title:Kali+Linux+Revealed&hl=&cd=2&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=H6a-DwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=H6a-DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 24.37, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 17.06, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=H6a-DwAAQBAJ&rdid=book-H6a-DwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 24370000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 17060000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=H6a-DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Perform powerful penetration testing using <b>Kali Linux</b>, Metasploit, Nessus, Nmap, and Wireshark Glen D. Singh. This error indicates that the target is vulnerable to ... Furthermore, the error <b>reveals</b> that the database is a MySQL server.'}}, {'kind': 'books#volume', 'id': 'mXT_DwAAQBAJ', 'etag': 'Xr/Pa1VNFuI', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/mXT_DwAAQBAJ', 'volumeInfo': {'title': 'Security and Privacy in Social Networks and Big Data', 'subtitle': '6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings', 'authors': ['Yang Xiang', 'Zheli Liu', 'Jin Li'], 'publisher': 'Springer Nature', 'publishedDate': '2020-09-25', 'description': 'This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9789811590313'}, {'type': 'ISBN_10', 'identifier': '9811590311'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 448, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=mXT_DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=mXT_DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=mXT_DwAAQBAJ&pg=PA223&dq=title:Kali+Linux+Revealed&hl=&cd=3&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=mXT_DwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=mXT_DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 52.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 37.09, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=mXT_DwAAQBAJ&rdid=book-mXT_DwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 52990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 37090000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Security_and_Privacy_in_Social_Networks-sample-epub.acsm?id=mXT_DwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Security_and_Privacy_in_Social_Networks-sample-pdf.acsm?id=mXT_DwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=mXT_DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'OpenBTS.org, “OpenBTS-UMTS,” 2 12 2014. http://openbts.org/w/index.php?<b>title</b>=Main_ Page. Accessed 15 Mar 2020 9. Buchanan, C., Ramachandran, V.: <b>Kali Linux</b> Wireless Penetration Testing Beginner's Guide (in Chinese).'}}, {'kind': 'books#volume', 'id': '9i_1DwAAQBAJ', 'etag': 'Ap0Dar7Rlus', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/9i_1DwAAQBAJ', 'volumeInfo': {'title': 'Hands on Hacking', 'subtitle': 'Become an Expert at Next Gen Penetration Testing and Purple Teaming', 'authors': ['Matthew Hickey', 'Jennifer Arcuri'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2020-09-16', 'description': "A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781119561453'}, {'type': 'ISBN_10', 'identifier': '1119561450'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 608, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 11, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.1.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&pg=PA239&dq=title:Kali+Linux+Revealed&hl=&cd=4&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&dq=title:Kali+Linux+Revealed&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Hands_on_Hacking.html?hl=&id=9i_1DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hands_on_Hacking-sample-pdf.acsm?id=9i_1DwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=9i_1DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': '... |_http-<b>title</b>: Private Browsing to port 8080 with your web browser ( http://<TargetIP>:8080 ) won't <b>reveal</b> an ... be found in /usr/share/metasploit-framework/data/wordlists/ tomcat_mgr_default_userpass.txt on your <b>Kali Linux</b> host.'}}, {'kind': 'books#volume', 'id': 'H-69DwAAQBAJ', 'etag': 'lnCBVsU4Xko', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/H-69DwAAQBAJ', 'volumeInfo': {'title': 'Bug Bounty Hunting for Web Security', 'subtitle': 'Find and Exploit Vulnerabilities in Web sites and Applications', 'authors': ['Sanjib Sinha'], 'publisher': 'Apress', 'publishedDate': '2019-11-12', 'description': 'Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injectionResist strongly unintended XML attacks Who This Book Is For White-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781484253915'}, {'type': 'ISBN_10', 'identifier': '1484253914'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 232, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.2.2.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=H-69DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=H-69DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=H-69DwAAQBAJ&printsec=frontcover&dq=title:Kali+Linux+Revealed&hl=&cd=5&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=H-69DwAAQBAJ&dq=title:Kali+Linux+Revealed&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Bug_Bounty_Hunting_for_Web_Security.html?hl=&id=H-69DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Bug_Bounty_Hunting_for_Web_Security-sample-epub.acsm?id=H-69DwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Bug_Bounty_Hunting_for_Web_Security-sample-pdf.acsm?id=H-69DwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=H-69DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'What You Will Learn Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL ...'}}, {'kind': 'books#volume', 'id': 'wboQAAAAYAAJ', 'etag': 'TC+WWxPc5RE', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/wboQAAAAYAAJ', 'volumeInfo': {'title': 'MultiCultural Review', 'publishedDate': '2002', 'industryIdentifiers': [{'type': 'OTHER', 'identifier': 'UTEXAS:059172144482263'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 1046, 'printType': 'BOOK', 'categories': ['Books'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '4.8.8.0.preview.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=wboQAAAAYAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=wboQAAAAYAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=wboQAAAAYAAJ&q=title:Kali+Linux+Revealed&dq=title:Kali+Linux+Revealed&hl=&cd=6&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=wboQAAAAYAAJ&dq=title:Kali+Linux+Revealed&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/MultiCultural_Review.html?hl=&id=wboQAAAAYAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=wboQAAAAYAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'NEWS NOTES American Library Association for his illustrations for this <b>title</b> . ... Karmen Gei ( Senegal , France , Canada ) , which <b>reveals</b> the conflict between the human desire for freedom and soci- ety's laws , won the Best Feature ...'}}, {'kind': 'books#volume', 'id': '2_6ZDwAAQBAJ', 'etag': 'gJz/YTdLwkw', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/2_6ZDwAAQBAJ', 'volumeInfo': {'title': 'Avaliação de segurança de redes', 'subtitle': 'Conheça a sua rede', 'authors': ['Chris McNab'], 'publisher': 'Novatec Editora', 'publishedDate': '2019-05-24', 'description': 'Qual é o nível de segurança de sua rede? A melhor maneira de descobrir é atacá-la usando as mesmas táticas que os invasores empregam, de modo a identificar e explorar seus pontos fracos. Com a edição atualizada deste livro prático, você aprenderá a fazer testes de invasão (pentest) em redes de forma estruturada. O especialista em segurança Chris McNab apresenta vulnerabilidades comuns e os passos que você deve executar para identificá-las em seu ambiente. A complexidade dos sistemas e as superfícies de ataque continuam aumentando. Este livro descreve um processo para ajudá-lo a atenuar os riscos aos quais a sua rede está sujeita. Todo capítulo inclui uma checklist que sintetiza as técnicas dos invasores, junto com medidas de proteção eficazes que podem ser utilizadas de imediato. Aprenda a testar os componentes de seu sistema de modo eficiente, incluindo: •Serviços comuns como SSH, FTP, Kerberos, SNMP e LDAP •Serviços Microsoft, incluindo NetBIOS, SMB, RPC e RDP •Serviços de email SMTP, POP3 e IMAP •Serviços IPsec e PPTP que oferecem acesso seguro à rede •Protocolos TLS e recursos que oferecem segurança no transporte •Software de servidores web, incluindo Microsoft IIS, Apache e Nginx •Frameworks, incluindo Rails, Django, Microsoft ASP.NET e PHP', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9788575227619'}, {'type': 'ISBN_10', 'identifier': '8575227610'}], 'readingModes': {'text': True, 'image': False}, 'pageCount': 463, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.4.4.0.preview.2', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=2_6ZDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=2_6ZDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'pt-BR', 'previewLink': 'http://books.google.gr/books?id=2_6ZDwAAQBAJ&pg=PT352&dq=title:Kali+Linux+Revealed&hl=&cd=7&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=2_6ZDwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=2_6ZDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 17.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 17.99, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=2_6ZDwAAQBAJ&rdid=book-2_6ZDwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 17990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 17990000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Avalia%C3%A7%C3%A3o_de_seguran%C3%A7a_de_redes-sample-epub.acsm?id=2_6ZDwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=2_6ZDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': '... <b>kali</b>:~# whatweb -a=4 http://www.microsoft.com http://www.microsoft.com[302] ASP_NET[2.0.50727], Cookies[mslocale], ... RedirectLocation[/en- gb/default.aspx], <b>Title</b>[Object moved], UncommonHeaders[vtag,x-ccc,x-cid,x-dg-taggedas], ...'}}, {'kind': 'books#volume', 'id': 'zKVTDwAAQBAJ', 'etag': 'SYUm+RCJjM8', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/zKVTDwAAQBAJ', 'volumeInfo': {'title': 'Webseiten hacken', 'subtitle': 'Schnelleinstieg inkl. Entwicklung eigener Angriffsscripte', 'authors': ['Mark B.'], 'publisher': 'BoD – Books on Demand', 'publishedDate': '2018-03-29', 'description': 'Wir kaufen ein, erledigen unsere Bankgeschäfte und kommunizieren mit Bekannten und Verwandten - alles online! Was unseren Alltag heute maßgeblich bestimmt und vereinfacht, hat aber auch seine Schattenseiten! In diesem Buch zeige ich Ihnen, wie typische Fehler in Webseiten ausgenutzt werden können. Außerdem sehen wir uns an, wie Phishing funktioniert und wie einfach man mit wenigen Zeilen Code sogar einen Trojaner programmieren kann. Lernen Sie wie ein Hacker zu denken, und schließen Sie Lücken in Ihren Webapplikationen, bevor diese zum Einfallstor für Angreifer werden! Darüber hinaus zeige ich Ihnen, wie einfach es für einen Hacker ist, eine Webseite zu verwenden um deren User mit Malware anzugreifen oder einen Account zu kapern.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9783746090573'}, {'type': 'ISBN_10', 'identifier': '3746090571'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 234, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '0.0.1.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=zKVTDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=zKVTDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'de', 'previewLink': 'http://books.google.gr/books?id=zKVTDwAAQBAJ&printsec=frontcover&dq=title:Kali+Linux+Revealed&hl=&cd=8&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=zKVTDwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=zKVTDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 17.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 17.99, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=zKVTDwAAQBAJ&rdid=book-zKVTDwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 17990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 17990000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Webseiten_hacken-sample-epub.acsm?id=zKVTDwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Webseiten_hacken-sample-pdf.acsm?id=zKVTDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=zKVTDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Wir kaufen ein, erledigen unsere Bankgeschäfte und kommunizieren mit Bekannten und Verwandten - alles online!'}}]}