Kali Linux

Results: 10



#Item
1Computing / Wireless / Bluetooth / Humancomputer interaction / Bluesnarfing / Computer security / Kali Linux / Fitbit / Wearable technology / Kismet / Security token / Java APIs for Bluetooth

Security of Bluetooth Network Data Traffic Michael Grant Williams DoD Contractor Iowa State University

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2016-06-13 23:23:06
2Computer network security / Kali Linux / OpenVAS / Nmap / Software testing / W3af / BackBox / Penetration test

Workshop MOSS 2016 “How to evaluate the security of cloud applications using open source tools” Description: The purpose of this workshop is to give participants a quick tour of some of the open source tools which ca

Add to Reading List

Source URL: mossconf.ro

Language: English - Date: 2016-03-09 08:01:29
3

Kali Linux Official Documentation

Add to Reading List

Source URL: www.coyotus.com

Language: French - Date: 2015-05-07 14:43:45
    4Computer network security / Software testing / Metasploit Project / Shellcode / Exploit / Nmap / Netcat / Hacker / Attack / Software / Computing / Computer security

        Penetration  Testing  with  Kali  Linux  

    Add to Reading List

    Source URL: www.offensive-security.com

    Language: English - Date: 2014-03-20 10:23:43
    5NTFS / IMG / Disk partitioning / Dd / Volume / Disk formatting / Mount / Computing / System software / Disk file systems

    Forensics: mounting a partition from a raw image by using Kali Linux Forensics: mounting a partition from a raw image by using Kali Linux by Alexandre Borges This document explains how to mount a partition from a raw im

    Add to Reading List

    Source URL: alexandreborgesbrazil.files.wordpress.com

    Language: English - Date: 2015-01-15 19:48:25
    6Adobe software / Linux / Computer network security / Computing platforms / ColdFusion / Capture the flag / Operating system / Adobe Flash Player / Vulnerability / Software / Computing / Cross-platform software

    Kali Linux CTF Blueprints Cameron Buchanan Chapter No. 1 "Microsoft Environments"

    Add to Reading List

    Source URL: cdn.oreillystatic.com

    Language: English - Date: 2014-07-28 09:17:13
    7Adobe software / Linux / Computer network security / Computing platforms / ColdFusion / Capture the flag / Operating system / Adobe Flash Player / Vulnerability / Software / Computing / Cross-platform software

    Kali Linux CTF Blueprints Cameron Buchanan Chapter No. 1 "Microsoft Environments"

    Add to Reading List

    Source URL: www.packtpub.com

    Language: English
    8Technology / Cryptographic protocols / IEEE 802.11 / Cyberwarfare / Aircrack-ng / Wired Equivalent Privacy / Wi-Fi Protected Access / Wi-Fi / Wireless LAN / Wireless networking / Computer network security / Computing

    Kali Linux Cookbook Willie L. Pritchett David De Smet Chapter No. 9

    Add to Reading List

    Source URL: www.packtpub.com

    Language: English
    9Security / Computer network security / Crime prevention / National security / Penetration test / Security testing / Metasploit Project / Vulnerability / Linux kernel / Computer security / Software testing / Cyberwarfare

    Kali Linux – Assuring Security by Penetration Testing Lee Allen Tedi Heriyanto Shakeel Ali

    Add to Reading List

    Source URL: www.packtpub.com

    Language: English
    10Computing / Software testing / Hacking / Penetration test / Vulnerability / Cross-site scripting / Linux / Application security / Computer security / Cyberwarfare / Computer network security

    Web Penetration Testing with Kali Linux Joseph Muniz Aamir Lakhani

    Add to Reading List

    Source URL: www.packtpub.com

    Language: English
    UPDATE