Hacking with kali practical penetration testing techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2014
|
| Edition: | 1st |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- ch. 1 Introduction
- Book Overview and Key Learning Points
- Book Audience
- Diagrams, Figures, and Screen Captures
- Welcome
- Penetration Testing Lifecycle
- Terms
- Kali History
- References
- ch. 2 Download and Install Kali Linux
- Chapter Overview and Key Learning Points
- Kali Linux
- System Information
- Downloading Kali
- Hard Drive Installation
- Thumb Drive Installation
- SD Card Installation
- Summary
- ch. 3 Software, Patches, and Upgrades
- Chapter Overview and Key Learning Points
- APT Package Handling Utility
- Debian Package Manager
- Tarballs
- A Practical Guide to Installing Nessus
- Conclusion
- ch. 4 Configuring Kali Linux
- Chapter Overview and Key Learning Points
- About This Chapter
- The Basics of Networking
- Using the Graphical User Interface to Configure Network Interfaces
- Using the Command Line to Configure Network Interfaces
- Using the GUI to Configure Wireless Cards
- Web Server
- FTP Server
- SSH Server
- Configure and Access External Media
- Updating Kali
- Upgrading Kali
- Adding a Repository Source
- Summary
- ch. 5 Building a Penetration Testing Lab
- Chapter Overview and Key Learning Points
- Before Reading This Chapter: Build a Lab
- Building a Lab on a Dime
- Metasploitable2
- Extending Your Lab
- The Magical Code Injection Rainbow
- ch. 6 Introduction to the Penetration Test Lifecycle
- Chapter Overview and Key Learning Points
- Introduction to the Lifecycle
- Phase 1 Reconnaissance
- Phase 2 Scanning
- Phase 3 Exploitation
- Phase 4 Maintaining Access
- Phase 5 Reporting
- Summary
- ch. 7 Reconnaissance
- Chapter Overview and Key Learning Points
- Introduction
- Start with the Targets Own Website
- Website Mirroring
- Google Searches
- Google Hacking
- Social Media
- Job Sites
- DNS and DNS Attacks
- Query a Name Server
- Zone Transfer
- Reference
- ch. 8 Scanning
- Chapter Overview and Key Learning Points
- Introduction to Scanning
- Understanding Network Traffic
- NMAP the King of Scanners
- Selecting Ports
- HPING3
- Nessus
- Summary
- ch. 9 Exploitation
- Chapter Overview and Key Learning Points
- Introduction
- An Overview of Metasploit
- Accessing Metasploit
- Web Server and Web Application Exploitation
- Conclusion
- ch. 10 Maintaining Access
- Chapter Overview and Key Learning Points
- Introduction
- Terminology and Core Concepts
- Backdoors
- Keyloggers
- Summary
- Reference
- ch. 11 Reports and Templates
- Chapter Overview and Key Learning Points
- Reporting
- Presentation
- Report and Evidence Storage
- Summary.


