Hacking with kali practical penetration testing techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2014
|
| Edition: | 1st |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100781 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025554.0 | ||
| 008 | 141013s2014 maua bi 000 0 eng d | ||
| 020 | |a 9780124077492 (pbk) | ||
| 020 | |a 0124077498 (pbk) | ||
| 020 | |a 9780124078833 | ||
| 020 | |a 0124078834 | ||
| 039 | 9 | |a 201501121652 |b zul |c 201411111252 |d shahrim |y 201410131952 |z syarifuddin | |
| 040 | |a UPNM | ||
| 090 | |a QA 76.9 .A25 |b .B76 2014 | ||
| 100 | 1 | |a Broad, James | |
| 245 | 1 | 0 | |a Hacking with kali |b practical penetration testing techniques |c James Broad, Andrew Bindner. |
| 250 | |a 1st | ||
| 260 | |a Waltham, MA |b Syngress |c 2014 | ||
| 300 | |a ix, 227 p. |b ill. |c 24 cm. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary. | |
| 520 | |a Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration tests. | ||
| 592 | |a 00013725 |b 03/11/2014 |c RM159.80 |h PVK | ||
| 630 | 0 | 0 | |a Kali Linux. |
| 650 | 0 | |a Penetration testing (Computer security). | |
| 650 | 0 | |a Computer networks |x Security measures. | |
| 700 | 1 | |a Bindner, Andrew | |
| 999 | |a vtls000052935 |c 100781 |d 100781 | ||


