Have a personal or library account? Click to login
Kali Linux Intrusion and Exploitation Cookbook Cover

Kali Linux Intrusion and Exploitation Cookbook

Powerful recipes to detect vulnerabilities and perform security assessments

Paid access
|May 2017
Product purchase options

Authors

Shah Dhruv :

Dhruv Shah holds a Masters degree in IT and has 7 years of experience as a specialist in Information Security. He started off as a trainer sensitizing staff in private sector organizations about security issues and what hackers look for when they launch attacks on networks. He, later on, switched his job to carry out penetration testing for Indian government agencies and then for banking clients in the Middle East. He now has extensive experience in penetration testing for Fortune 500 companies involving web and mobile applications, networks, Infra, and Red Team work. In his spare time, he co-authored the book Kali Linux Intrusion and Exploitation and is an active member and moderator of one of the Null chapters in India.Girdhar Ishan :

Ishan Girdhar is a senior pentester and DevSecOps engineer. With over 7 years of work experience, he has been vigorously involved in building application security and bug bounty programs, in his current and previous roles, helping businesses and organizations to be more secure ad aware. He is currently working with Southeast Asia's biggest ride-hailing platform, Grab. Previously, he has worked with organizations such as InMobi and one of

PDF ISBN: 978-1-78398-217-2
Publisher: Packt Publishing Limited
Copyright owner: © 2017 Packt Publishing Limited
Publication date: 2017
Language: English
Pages: 512