Kali Linux in Action
Language: Russian
Author: Nikita Skabtsov
Year: 2024
Security Audit of Information Systems
This book examines methods for bypassing network service security systems and penetrating open information systems. Information security, like many things in our world, is a two-sided coin. On one side, we conduct audits, look for ways to penetrate systems, and even apply them in practice, while on the other, we work on protection. Penetration tests are part of the normal lifecycle of any IT infrastructure, allowing for a true assessment of potential risks and the identification of hidden problems.
Can hacking be legal? Of course it can! But only in two cases: when you hack information systems that belong to you, or when you hack a corporate network with which you have a written agreement for an audit or penetration test. We hope you will use the information in this book only for the purpose of legal hacking of information systems. Please remember that punishment is inevitable—any illegal actions will lead to administrative or criminal liability.
Your purchase is protected.

