Hacking with kali practical penetration testing techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of...

Full description

Saved in:
Bibliographic Details
Main Author: Broad, James
Other Authors: Bindner, Andrew
Format: Book
Language:English
Published: Waltham, MA Syngress 2014
Edition:1st
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100781
003 MY-KLNDU
005 20241220025554.0
008 141013s2014 maua bi 000 0 eng d
020 |a 9780124077492 (pbk) 
020 |a 0124077498 (pbk) 
020 |a 9780124078833 
020 |a 0124078834 
039 9 |a 201501121652  |b zul  |c 201411111252  |d shahrim  |y 201410131952  |z syarifuddin 
040 |a UPNM 
090 |a QA 76.9 .A25  |b .B76 2014 
100 1 |a Broad, James 
245 1 0 |a Hacking with kali  |b practical penetration testing techniques  |c James Broad, Andrew Bindner. 
250 |a 1st 
260 |a Waltham, MA  |b Syngress  |c 2014 
300 |a ix, 227 p.  |b ill.  |c 24 cm. 
504 |a Includes bibliographical references and index. 
505 0 |a ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary. 
520 |a Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration tests. 
592 |a 00013725  |b 03/11/2014  |c RM159.80  |h PVK 
630 0 0 |a Kali Linux. 
650 0 |a Penetration testing (Computer security). 
650 0 |a Computer networks  |x Security measures. 
700 1 |a Bindner, Andrew 
999 |a vtls000052935  |c 100781  |d 100781