Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Operational systems
- Linux
- Web Penetration Testing with Kali Linux. Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit
E-book details
Log in, If you're interested in the contents of the item.
Web Penetration Testing with Kali Linux. Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit
Joseph Muniz, Aamir Lakhani, Aamir Lakhani
Ebook
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.
Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.
Web Penetration Testing with Kali Linux looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.
You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.
On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.
Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.
Web Penetration Testing with Kali Linux looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.
You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.
On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.
- Web Penetration Testing with Kali Linux
- Table of Contents
- Web Penetration Testing with Kali Linux
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Penetration Testing and Setup
- Web application Penetration Testing concepts
- Penetration Testing methodology
- Calculating risk
- Kali Penetration Testing concepts
- Step 1 Reconnaissance
- Step 2 Target evaluation
- Step 3 Exploitation
- Step 4 Privilege Escalation
- Step 5 maintaining a foothold
- Introducing Kali Linux
- Kali system setup
- Running Kali Linux from external media
- Installing Kali Linux
- Kali Linux and VM image first run
- Kali toolset overview
- Summary
- 2. Reconnaissance
- Reconnaissance objectives
- Initial research
- Company website
- Web history sources
- Regional Internet Registries (RIRs)
- Electronic Data Gathering, Analysis, and Retrieval (EDGAR)
- Social media resources
- Trust
- Job postings
- Location
- Shodan
- Google hacking
- Google Hacking Database
- Researching networks
- HTTrack clone a website
- ICMP Reconnaissance techniques
- DNS Reconnaissance techniques
- DNS target identification
- Maltego Information Gathering graphs
- Nmap
- FOCA website metadata Reconnaissance
- Summary
- 3. Server-side Attacks
- Vulnerability assessment
- Webshag
- Skipfish
- ProxyStrike
- Vega
- Owasp-Zap
- Websploit
- Exploitation
- Metasploit
- w3af
- Exploiting e-mail systems
- Brute-force attacks
- Hydra
- DirBuster
- WebSlayer
- Cracking passwords
- John the Ripper
- Man-in-the-middle
- SSL strip
- Starting the attack redirection
- Setting up port redirection using Iptables
- SSL strip
- Summary
- Vulnerability assessment
- 4. Client-side Attacks
- Social engineering
- Social Engineering Toolkit (SET)
- Using SET to clone and attack
- MitM Proxy
- Host scanning
- Host scanning with Nessus
- Installing Nessus on Kali
- Using Nessus
- Host scanning with Nessus
- Obtaining and cracking user passwords
- Windows passwords
- Mounting Windows
- Linux passwords
- Windows passwords
- Kali password cracking tools
- Johnny
- hashcat and oclHashcat
- samdump2
- chntpw
- Ophcrack
- Crunch
- Other tools available in Kali
- Hash-identifier
- dictstat
- RainbowCrack (rcracki_mt)
- findmyhash
- phrasendrescher
- CmosPwd
- creddump
- Summary
- 5. Attacking Authentication
- Attacking session management
- Clickjacking
- Hijacking web session cookies
- Web session tools
- Firefox plugins
- Firesheep Firefox plugin
- Web Developer Firefox plugin
- Greasemonkey Firefox plugin
- Cookie Injector Firefox plugin
- Cookies Manager+ Firefox plugin
- Cookie Cadger
- Wireshark
- Hamster and Ferret
- Man-in-the-middle attack
- dsniff and arpspoof
- Ettercap
- Driftnet
- SQL Injection
- sqlmap
- Cross-site scripting (XSS)
- Testing cross-site scripting
- XSS cookie stealing / Authentication hijacking
- Other tools
- urlsnarf
- acccheck
- hexinject
- Patator
- DBPwAudit
- Summary
- Attacking session management
- 6. Web Attacks
- Browser Exploitation Framework BeEF
- FoxyProxy Firefox plugin
- BURP Proxy
- OWASP ZAP
- SET password harvesting
- Fimap
- Denial of Services (DoS)
- THC-SSL-DOS
- Scapy
- Slowloris
- Low Orbit Ion Cannon
- Other tools
- DNSCHEF
- SniffJoke
- Siege
- Inundator
- TCPReplay
- Summary
- 7. Defensive Countermeasures
- Testing your defenses
- Baseline security
- STIG
- Patch management
- Password policies
- Mirror your environment
- HTTrack
- Other cloning tools
- Man-in-the-middle defense
- SSL strip defense
- Denial of Service defense
- Cookie defense
- Clickjacking defense
- Digital forensics
- Kali Forensics Boot
- Filesystem analysis with Kali
- dc3dd
- Other forensics tools in Kali
- chkrootkit
- Autopsy
- Binwalk
- pdf-parser
- Foremost
- Pasco
- Scalpel
- bulk_extractor
- Kali Forensics Boot
- Summary
- Testing your defenses
- 8. Penetration Test Executive Report
- Compliance
- Industry standards
- Professional services
- Documentation
- Report format
- Cover page
- Confidentiality statement
- Document control
- Timeline
- Executive summary
- Methodology
- Detailed testing procedures
- Summary of findings
- Vulnerabilities
- Network considerations and recommendations
- Appendices
- Glossary
- Statement of Work (SOW)
- External Penetration Testing
- Additional SOW material
- Kali reporting tools
- Dradis
- KeepNote
- Maltego CaseFile
- MagicTree
- CutyCapt
- Sample reports
- Summary
- Index
- Title: Web Penetration Testing with Kali Linux. Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit
- Author: Joseph Muniz, Aamir Lakhani, Aamir Lakhani
- Original title: Web Penetration Testing with Kali Linux. Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.
- ISBN: 9781782163176, 9781782163176
- Date of issue: 2013-09-25
- Format: Ebook
- Item ID: e_3bf8
- Publisher: Packt Publishing