Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Mastering Wireshark 2 by Andrew Crouthamel #Wireshark
--------------------------------
Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people.
Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You’ll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files.
By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes.
----------------------------------
2018 | EPUB | 326 pages | 54,8 MB
-------------------------------------
@iranopensource🐧
--------------------------------
Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people.
Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You’ll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files.
By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes.
----------------------------------
2018 | EPUB | 326 pages | 54,8 MB
-------------------------------------
@iranopensource🐧
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
سعی کن آنقدر کامل باشی
که بزرگترین تنبیه تو برای دیگران،
گرفتن خودت از آنها باشد...!
پائولو کوئیلو
@iranopensource🐧
که بزرگترین تنبیه تو برای دیگران،
گرفتن خودت از آنها باشد...!
پائولو کوئیلو
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Mastering Metasploit - Second Edition by Nipun Jaswal #Metasploit
—----------------
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher, and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.
In the next section, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
—------------——————————————
2016 | PDF | 432 pages | 26.8 MB
—-----------——————————————-
@iranopensource🐧
—----------------
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher, and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.
In the next section, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
—------------——————————————
2016 | PDF | 432 pages | 26.8 MB
—-----------——————————————-
@iranopensource🐧
Iran Open Source (IOS)
🐧 لینک گروه جامعه متن باز ایران https://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA @iranopensource🐧
Ansible provides a clear and concise way to manage the configuration of your Linux infrastructure. It can help in making your infrastructure more maintainable, quicker to deploy, and easier to understand.
“Ansible Configuration Management” will take you from your very first command all the way to extending the very capabilities of Ansible itself. It takes a practical approach with hands-on examples, which ensures that the readers walk away with all the knowledge and skills they will need to harness Ansible.
“Ansible Configuration Management” starts with an explanation of the basics and builds the reader’s knowledge through step-by-step guidelines.
The book concentrates on discussions related to realistic worked examples. Using this approach we discuss how to perform ad-hoc actions, script actions together to set up services, and how to script more complicated tasks. The discussion carries onto explanation of organising your configurations for large deployments and warps up with examples of how to extend the capabilities of Ansible.
“Ansible Configuration Management” provides the knowledge you require to effectively manage your systems in a simple, quick, and maintainable way.
What you will learn from this book
Configure your systems and services with Ansible
Use Ansible command line tools to interrogate systems
Script Ansible to perform multiple actions with one command
Build maintainable configurations for large environments
Learn how and when to use advanced features of Ansible
Use an inventory that is dynamically generated
Understand the use of Ansible roles to split your configurations into logical parts
Extend the functionality of Ansible by writing your own module
——————————————-
2013 | PDF | 92 Pages | 0.8 MB
——————————————-
@iranopensource🐧
“Ansible Configuration Management” will take you from your very first command all the way to extending the very capabilities of Ansible itself. It takes a practical approach with hands-on examples, which ensures that the readers walk away with all the knowledge and skills they will need to harness Ansible.
“Ansible Configuration Management” starts with an explanation of the basics and builds the reader’s knowledge through step-by-step guidelines.
The book concentrates on discussions related to realistic worked examples. Using this approach we discuss how to perform ad-hoc actions, script actions together to set up services, and how to script more complicated tasks. The discussion carries onto explanation of organising your configurations for large deployments and warps up with examples of how to extend the capabilities of Ansible.
“Ansible Configuration Management” provides the knowledge you require to effectively manage your systems in a simple, quick, and maintainable way.
What you will learn from this book
Configure your systems and services with Ansible
Use Ansible command line tools to interrogate systems
Script Ansible to perform multiple actions with one command
Build maintainable configurations for large environments
Learn how and when to use advanced features of Ansible
Use an inventory that is dynamically generated
Understand the use of Ansible roles to split your configurations into logical parts
Extend the functionality of Ansible by writing your own module
——————————————-
2013 | PDF | 92 Pages | 0.8 MB
——————————————-
@iranopensource🐧
در زندگی آموخته ام؛
که جایگاه و موقعیت را
میتوان خرید
ولی
احترام را باید کسب کرد... (پروفسور سمیعی)
@iranopensource🐧
که جایگاه و موقعیت را
میتوان خرید
ولی
احترام را باید کسب کرد... (پروفسور سمیعی)
@iranopensource🐧