Learning Parrot OS, Arvin Destar (9788198431691) — Readings Books
Learning Parrot OS
Paperback

Learning Parrot OS

$130.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.

You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.

Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.

Use bash scripting to automate and streamline penetration testing workflows.

Manage files and directories using command-line tools like rsync, grep, and awk.

Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.

Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.

Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.

Perform robust password audits and recover weak credentials using John the Ripper.

Test wireless networks using Aircrack-ng in WEP and WPA protocols.

Leverage pivoting techniques across compromised networks.

Integrate automated recon and scanning for continuous network monitoring.

Table of ContentGetting Started with Parrot OS

Up and Running with Parrot OS

System Configuration and Customization

Mastering Command-Line Utilities

Leveraging Parrot OS Security Tools

Conducting Network Reconnaissance

Exploiting Vulnerabilities with Metasploit

Advanced Web Application Testing

Implementing Sniffing and Tunneling

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO

Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.

Format
Paperback
Publisher
Gitforgits
Date
30 December 2024
Pages
172
ISBN
9788198431691

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.

You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.

Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.

Use bash scripting to automate and streamline penetration testing workflows.

Manage files and directories using command-line tools like rsync, grep, and awk.

Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.

Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.

Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.

Perform robust password audits and recover weak credentials using John the Ripper.

Test wireless networks using Aircrack-ng in WEP and WPA protocols.

Leverage pivoting techniques across compromised networks.

Integrate automated recon and scanning for continuous network monitoring.

Table of ContentGetting Started with Parrot OS

Up and Running with Parrot OS

System Configuration and Customization

Mastering Command-Line Utilities

Leveraging Parrot OS Security Tools

Conducting Network Reconnaissance

Exploiting Vulnerabilities with Metasploit

Advanced Web Application Testing

Implementing Sniffing and Tunneling

Read More
Format
Paperback
Publisher
Gitforgits
Date
30 December 2024
Pages
172
ISBN
9788198431691