Torrent details for "Hacking Mastery With Kali Linux" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
11.4 MB
Info Hash:
484345481B8178F3E070649E413A09D39CDE9189
Added By:
Added:
June 1, 2023, 10:53 p.m.
Stats:
|
(Last updated: July 11, 2025, 3:01 a.m.)
Name
DL
Uploader
Size
S/L
Added
-
2.6 GB
[16
/
19]
2023-06-01
| Uploaded by freecoursewb | Size 2.6 GB | Health [ 16 /19 ] | Added 2023-06-01 |
-
506.6 MB
[11
/
0]
2023-07-01
| Uploaded by tutsgalaxy | Size 506.6 MB | Health [ 11 /0 ] | Added 2023-07-01 |
-
2.7 GB
[15
/
27]
2023-07-01
| Uploaded by FreeCourseWeb | Size 2.7 GB | Health [ 15 /27 ] | Added 2023-07-01 |
NOTE
SOURCE: Hacking Mastery With Kali Linux
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Do you want to become a professional hacker?
If answer to that question is yes, then you need to learn Kali Linux. It is the most world famous and the best operating system for hacking and pentration testing!
This book will not only be teaching you hacking with kali linux, but will also teach you all the things you need to be successful in the career of hacking and pentration testing. Even if you're a complete beginner and have never used kali linux before, don't worry, because we will start you off with the very basic until you reach the advance level.
In the first 5 chapters we will be covering some basic things like setting up lab, linux basic internet protocol and more to make you comfortable with kali linux. From chapters 5 to 10 you will be learning intermediate concepts like Trojan, viruses and worms, password cracking, and network sniffing. Here you will be introduced to the real world of hacking.
In the last 5 chapters we will be covering few more advance concepts like gaining access, post exploitation, anti-virus evasions and much more. All the chapters in this book have a theoretical and a practical portion. This book also contains more then 150+ screenshots that makes complex attack easy to follow.
Table of content
Introduction
Setting up a lab
Linux basic
Internet protocol
Port number
Trojan, viruses and worms
Password attack & cracking
Network sniffing & spoofing
Staying anonmous online
Information gathering
Gaining access
Post exploitation
Anti-viurs evasion
File Transfer
Bonus Section
×


