My Account Log in

2 options

Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions / Himanshu Sharma.

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Sharma, Himanshu, author.
Language:
English
Subjects (All):
Kali Linux.
Penetration testing (Computer security).
Computer security.
Physical Description:
1 online resource (366 pages) : illustrations
Edition:
1st edition
Place of Publication:
Birmingham, England ; Mumbai, [India] : Packt, 2017.
System Details:
text file
Summary:
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Contents:
Cover
Title Page
Copyright
Credits
Disclaimer
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Table of Contents
Preface
Chapter 1: Kali - An Introduction
Introduction
Configuring Kali Linux
Getting ready
How to do it...
How it works...
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Dnscan
Subbrute
Dirsearch
Pentesting VPN's ike-scan
Cracking the PSK
Setting up proxychains
Using proxychains with tor
Going on a hunt with Routerhunter
Chapter 2: Gathering Intel and Planning Attack Strategies
Getting a list of subdomains
Fierce
DNSdumpster
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
See also
Using Nmap to find open ports
Using scripts
Bypassing firewalls with Nmap
TCP ACK scan
TCP Window scan
Idle scan
Searching for open directories
The dirb tool
There's more...
Performing deep magic with DMitry
Hunting for SSL flaws
Exploring connections with intrace
Digging deep with theharvester
How it works.
Finding the technology behind web apps
Scanning IPs with masscan
Sniffing around with Kismet
Testing routers with firewalk
Chapter 3: Vulnerability Assessment
Using the infamous Burp
Exploiting WSDLs with Wsdler
Using Intruder
Web app pentest with Vega
Exploring SearchSploit
Exploiting routers with RouterSploit
Using the scanners command
Using creds
Using Metasploit
Automating Metasploit
Writing a custom resource script
Databases in Metasploit
Chapter 4: Web App Exploitation - Beyond
Exploiting XSS with XSS Validator
Injection attacks with sqlmap
Owning all .svn and .git repositories
Winning race conditions
Exploiting JBoss with JexBoss
Exploiting PHP Object Injection
Backdoors using web shells
Backdoors using meterpreters
Chapter 5: Network Exploitation on Current Exploitation
Man in the middle with hamster and ferret
Exploring the msfconsole
Railgun in Metasploit
Using the paranoid meterpreter
A tale of a bleeding heart
Redis exploitation
Say no to SQL - owning MongoDBs
How to do it.
Embedded device hacking
Elasticsearch exploit
Good old Wireshark
This is Sparta!
Chapter 6: Wireless Attacks - Getting Past
The good old Aircrack
Hands on with Gerix
Dealing with WPAs
Owning employee accounts with Ghost Phisher
Pixie dust attack
Chapter 7: Password Attacks - The Fault
Identifying different types of hash in the wild!
MD5
MySQL less than v4.1
MD5 (WordPress)
MySQL 5
Base64 encoding
Using hash-identifier
Cracking with patator
Cracking hashes online
Hashkiller
Crackstation
OnlineHashCrack
Playing with John the ripper
Johnny Bravo!
Using cewl
Generating word list with crunch
Chapter 8: Have Shell Now What?
Spawning a TTY Shell
Looking for weakness
Horizontal escalation
Vertical escalation
Node hopping - pivoting
There's more…
Privilege escalation on Windows
Using PowerSploit
How to do it…
Pulling plaintext passwords with mimikatz
Dumping other saved passwords from the machine
Pivoting into the network
Backdooring for persistence
Chapter 9: Buffer Overflows
Exploiting stack-based buffer overflows
Exploiting buffer overflow on real software
SEH bypass
Exploiting egg hunters
An overview of ASLR and NX bypass
Chapter 10: Playing with Software-Defined Radios
Radio frequency scanners
Hands-on with RTLSDR scanner
Playing around with gqrx
Kalibrating device for GSM tapping
Decoding ADS-B messages with Dump1090
Chapter 11: Kali in Your Pocket -NetHunters and Raspberries
Installing Kali on Raspberry Pi
Installing NetHunter
Superman typing - HID attacks
Can I charge my phone?
Setting up an evil access point
Chapter 12: Writing Reports
Generating reports using Dradis
Using MagicTree
Index.
Notes:
Includes index.
Description based on online resource; title from PDF title page (EBC, viewed February 6, 2018).
OCLC:
1011595388

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account