- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 180字
- 2021-07-02 12:38:25
Introduction to Kali NetHunter
Hacking is an interesting topic of discussion for lots of people, whether they work in the field of cybersecurity or are simply interested in learning the details of how it’s done. Often, TV shows and movies incorporate hackers into the plot. Some TV shows, fictional or non-fictional, are solely based on hacking, notable one being Mr. Robot. In the show, a young man orchestrates and executes various cyberattacks on multiple organizations using real-world techniques.
Many TV shows and movies often show a hacker using a mobile or other handheld devices to infiltrate a target network. This begs the question: is hacking from a mobile device, such as a phone, possible? The answer to this question is yes. We are surrounded by so much technology and so many smart devices. Imagine using your smart device to test a network or system for vulnerabilities and perhaps exploit it; this would definitely be very cool.
In this chapter, we will be covering the following topics:
- Introducing Kali NetHunter
- The Android platform and Security model
- Installing Kali NetHunter
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 黑客攻防技巧
- 工業(yè)物聯(lián)網(wǎng)安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 局域網(wǎng)交換機(jī)安全
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)空間安全法律問題研究
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測(cè)與響應(yīng)
- 云計(jì)算安全技術(shù)與應(yīng)用
- 黑客攻防入門
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告
- Web安全之機(jī)器學(xué)習(xí)入門