LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services.
Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.
This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
Information Security professionals of all levels, hackers, systems administrators, network administrators, beginning and intermediate professional Pen Testers, and an academic audience among information security majors.
Dedication
Chapter 1. Introduction
Information in This Chapter
Book Overview and Key Learning Points
Book Audience
Diagrams, Figures, and Screen Captures
Welcome
Penetration Testing Lifecycle
Terms
Kali History
References
Chapter 2. Download and Install Kali Linux
Information in This Chapter
Chapter Overview and Key Learning Points
Kali Linux
System Information
Downloading Kali
Hard Drive Installation
Thumb Drive Installation
SD Card Installation
Summary
Chapter 3. Software, Patches, and Upgrades
Information in This Chapter
Chapter Overview and Key Learning Points
APT Package Handling Utility
Debian Package Manager
Tarballs
A Practical Guide to Installing Nessus
Conclusion
Chapter 4. Configuring Kali Linux
Information in This Chapter
Chapter Overview and Key Learning Points
About This Chapter
The Basics of Networking
Using the Graphical User Interface to Configure Network Interfaces
Using the Command Line to Configure Network Interfaces
Using the GUI to Configure Wireless Cards
Web Server
FTP Server
SSH Server
Configure and Access External Media
Updating Kali
Upgrading Kali
Adding a Repository Source
Summary
Chapter 5. Building a Penetration Testing Lab
Information in This Chapter
Chapter Overview and Key Learning Points
Before Reading This Chapter: Build a Lab
Building a Lab on a Dime
Metasploitable2
Extending Your Lab
The Magical Code Injection Rainbow
Chapter 6. Introduction to the Penetration Test Lifecycle
Information in This Chapter
Chapter Overview And Key Learning Points
Introduction to the Lifecycle
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Exploitation
Phase 4: Maintaining Access
Phase 5: Reporting
Summary
Chapter 7. Reconnaissance
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
Start with the Targets Own Website
Website Mirroring
Google Searches
Google Hacking
Social Media
Job Sites
DNS and DNS Attacks
Query a Name Server
Zone Transfer
Reference
Chapter 8. Scanning
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction to Scanning
Understanding Network Traffic
NMAP the King of Scanners
Selecting Ports
HPING3
Nessus
Summary
Chapter 9. Exploitation
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
An Overview of Metasploit
Accessing Metasploit
Web Server and Web Application Exploitation
Conclusion
Chapter 10. Maintaining Access
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
Terminology and Core Concepts
Backdoors
Keyloggers
Summary
Reference
Chapter 11. Reports and Templates
Information in This Chapter
Chapter Overview and Key Learning Points
Reporting
Presentation
Report and Evidence Storage
Summary
Appendix A. Tribal Chicken
Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5
Materials List
Install and Configure Ubuntu
Install Kali Linux 1.0.5
Customize the Interface
Running Updates
Building an ISO using Tribal Chicken
Burning an ISO to a DVD or Blu-Ray Disc
Testing and Validation (Short Version)
Appendix B. Kali Penetration Testing Tools
Index
JB
AB