Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Hacking
- Penetration tests
- Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
E-book details
Log in, If you're interested in the contents of the item.
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
Lee Allen, Shakeel Ali, Tedi Heriyanto
Ebook
- Kali Linux Assuring Security by Penetration Testing
- Table of Contents
- Kali Linux Assuring Security by Penetration Testing
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Disclaimer
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- I. Lab Preparation and Testing Procedures
- 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Running Kali using Live DVD
- Installing on a hard disk
- Installing Kali on a physical machine
- Installing Kali on a virtual machine
- Installing Kali on a virtual machine from the ISO image
- Installing Kali in a virtual machine using the provided Kali VM image
- Installing Kali on a USB disk
- Configuring the virtual machine
- VirtualBox guest additions
- Setting up networking
- Setting up a wired connection
- Setting up a wireless connection
- Starting the network service
- Configuring shared folders
- Saving the guest machine state
- Exporting a virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- HTTP
- MySQL
- SSH
- Installing a vulnerable server
- Installing additional weapons
- Installing the Nessus vulnerability scanner
- Installing the Cisco password cracker
- Summary
- 2. Penetration Testing Methodology
- Types of penetration testing
- Black box testing
- White box testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- Open Source Security Testing Methodology Manual (OSSTMM)
- Key features and benefits
- Information Systems Security Assessment Framework (ISSAF)
- Key features and benefits
- Open Web Application Security Project (OWASP)
- Key features and benefits
- Web Application Security Consortium Threat Classification (WASC-TC)
- Key features and benefits
- Open Source Security Testing Methodology Manual (OSSTMM)
- Penetration Testing Execution Standard (PTES)
- Key features and benefits
- General penetration testing framework
- Target scoping
- Information gathering
- Target discovery
- Enumerating target
- Vulnerability mapping
- Social engineering
- Target exploitation
- Privilege escalation
- Maintaining access
- Documentation and reporting
- The ethics
- Summary
- Types of penetration testing
- 1. Beginning with Kali Linux
- II. Penetration Testers Armory
- 3. Target Scoping
- Gathering client requirements
- Creating the customer requirements form
- The deliverables assessment form
- Preparing the test plan
- The test plan checklist
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Gathering client requirements
- 4. Information Gathering
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- host
- dig
- dnsenum
- dnsdict6
- fierce
- DMitry
- Maltego
- Getting network routing information
- tcptraceroute
- tctrace
- Utilizing the search engine
- theharvester
- Metagoofil
- Summary
- 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- ping
- arping
- fping
- hping3
- nping
- alive6
- detect-new-ip6
- passive_discovery6
- nbtscan
- OS fingerprinting
- p0f
- Nmap
- Summary
- 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Nmap
- Nmap target specification
- Nmap TCP scan options
- Nmap UDP scan options
- Nmap port specification
- Nmap output options
- Nmap timing options
- Nmap useful options
- Service version detection
- Operating system detection
- Disabling host discovery
- Aggressive scan
- Nmap for scanning the IPv6 target
- The Nmap scripting engine
- Nmap options for Firewall/IDS evasion
- Unicornscan
- Zenmap
- Amap
- Nmap
- SMB enumeration
- SNMP enumeration
- onesixtyone
- snmpcheck
- VPN enumeration
- ike-scan
- Summary
- Introducing port scanning
- 7. Vulnerability Mapping
- Types of vulnerabilities
- Local vulnerability
- Remote vulnerability
- Vulnerability taxonomy
- Open Vulnerability Assessment System (OpenVAS)
- Tools used by OpenVAS
- Cisco analysis
- Cisco auditing tool
- Cisco global exploiter
- Fuzz analysis
- BED
- JBroFuzz
- SMB analysis
- Impacket Samrdump
- SNMP analysis
- SNMP Walk
- Web application analysis
- Database assessment tools
- DBPwAudit
- SQLMap
- SQL Ninja
- Web application assessment
- Burp Suite
- Nikto2
- Paros proxy
- W3AF
- WafW00f
- WebScarab
- Database assessment tools
- Summary
- Types of vulnerabilities
- 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Impersonation
- Reciprocation
- Influential authority
- Scarcity
- Social relationship
- Social Engineering Toolkit (SET)
- Targeted phishing attack
- Summary
- 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Scenario 1
- Scenario 2
- SNMP community scanner
- VNC blank authentication scanner
- IIS6 WebDAV unicode auth bypass
- Scenario 3
- Bind shell
- Reverse shell
- Meterpreter
- Scenario 4
- Generating a binary backdoor
- Automated browser exploitation
- Writing exploit modules
- Summary
- 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Offline attack tools
- hash-identifier
- Hashcat
- RainbowCrack
- samdump2
- John
- Johnny
- Ophcrack
- Crunch
- Online attack tools
- CeWL
- Hydra
- Medusa
- Offline attack tools
- Network spoofing tools
- DNSChef
- Setting up a DNS proxy
- Faking a domain
- arpspoof
- Ettercap
- DNSChef
- Network sniffers
- dsniff
- tcpdump
- Wireshark
- Summary
- 11. Maintaining Access
- Using operating system backdoors
- Cymothoa
- Intersect
- The meterpreter backdoor
- Working with tunneling tools
- dns2tcp
- iodine
- Configuring the DNS server
- Running the iodine server
- Running the iodine client
- ncat
- proxychains
- ptunnel
- socat
- Getting HTTP header information
- Transferring files
- sslh
- stunnel4
- Creating web backdoors
- WeBaCoo
- weevely
- PHP meterpreter
- Summary
- Using operating system backdoors
- 12. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- 3. Target Scoping
- III. Extra Ammunition
- A. Supplementary Tools
- Reconnaissance tool
- Vulnerability scanner
- NeXpose Community Edition
- Installing NeXpose
- Starting the NeXpose community
- Logging in to the NeXpose community
- Using the NeXpose community
- NeXpose Community Edition
- Web application tools
- Golismero
- Arachni
- BlindElephant
- Network tool
- Netcat
- Open connection
- Service banner grabbing
- Simple chat server
- File transfer
- Portscanning
- Backdoor shell
- Reverse shell
- Netcat
- Summary
- B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Vulnerability disclosure and tracking
- A. Supplementary Tools
- Index
- Title: Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
- Author: Lee Allen, Shakeel Ali, Tedi Heriyanto
- Original title: Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.
- ISBN: 9781849519496, 9781849519496
- Date of issue: 2014-04-07
- Format: Ebook
- Item ID: e_3c8w
- Publisher: Packt Publishing