• Hacked

  • Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
  • By: Alan T. Norman
  • Narrated by: Jack Ares
  • Length: 3 hrs and 14 mins
  • 5.0 out of 5 stars (9 ratings)

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Hacked  By  cover art

Hacked

By: Alan T. Norman
Narrated by: Jack Ares
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity.

The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks.

Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!

Get answers from an experienced IT expert to every single question you have related to the learning you do in this audiobook including:

  • installing Kali Linux
  • using VirtualBox
  • basics of Linux
  • Staying anonymous with Tor
  • Proxychains, Virtual Private Networks (VPN)
  • Macchanger, Nmap
  • cracking wifi
  • aircrack
  • cracking Linux passwords

What are the requirements?

  • Reliable and fast internet connection.
  • Wireless networking card.
  • Kali Linux Distribution
  • Basic IT skills

What will you get from the hacking audiobook?

  • Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional!
  • You will learn the basics of network
  • Deal with a lot of Kali Linux tools
  • Learn some Linux commands
  • Tips for remaining anonymous in hacking and penetration testing activities.
  • Protect your WiFi network against all the attacks
  • Gain access to any client account in the WiFi network
  • A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords.
  • Step-by-step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.
©2018 Alan T. Norman (P)2019 Alan T. Norman

What listeners say about Hacked

Average customer ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    9
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    8
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    9
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Great book

The book concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Thanks Alan T. Norman!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Well Done

This manual will make your understanding obvious through all around mentioned offered course , to make Learning fundamental.The writer gives an outline of how to get ready bootable media and introduce the software.Very clear and with genuine guides to find out pretty much every one of the stunts and clarifications about hacking with Kali Linux and Wireless Hacking. This book is astounding. I slanted such epic measures of feasible things from this book. I adore this book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Incredible book!

I got the book with an interest in learning the basics of Kali Linux penetration testing and I finished the book with an eagerness to learn more about pen testing and other advanced techniques. It takes the new user through what penetration testing is and why it is needed; but also has some information for those already doing testing, as well as other resources they may need.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Nice book

The teacher ( Alan ) knows the subject matter. He is the first person who taught subletting to my understanding. Very detailed and precise instructions Kali Linux. Really enjoyed it. I feel more comfortable with this knowledge. Really a great read! I like the way this book looked. perfect sense and probably the most helpful part of the Guide to Learn Kali Linux Step by Step book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Well worth!

I purchased this book to help me learn how to use Kali Linux, and so far I am extremely pleased with the material. I am definitely going to be purchasing more from this author because the book explains very well how to use the various programs that are featured in Kali Linux.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Recommended!

This book is astounding. I slanted such huge measures of practical things from this book. I adore this book. I was truly worth investigating this book. This book remarkable reason most of these books tips are incredibly valuable. I would prescribe this book to anyone. Whatever by virtue of essayist and must be recommended for this book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

A complete tutorial explaining how to build a virt

A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords, VirtualBox , network, WiFi network against all the attacks! So you will know everything !! Great!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!