2 options
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions / Himanshu Sharma.
- Format:
- Book
- Author/Creator:
- Sharma, Himanshu, author.
- Language:
- English
- Subjects (All):
- Kali Linux.
- Penetration testing (Computer security).
- Computer security.
- Physical Description:
- 1 online resource (366 pages) : illustrations
- Edition:
- 1st edition
- Place of Publication:
- Birmingham, England ; Mumbai, [India] : Packt, 2017.
- System Details:
- text file
- Summary:
- Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
- Contents:
- Cover
- Title Page
- Copyright
- Credits
- Disclaimer
- About the Author
- About the Reviewer
- www.PacktPub.com
- Customer Feedback
- Table of Contents
- Preface
- Chapter 1: Kali - An Introduction
- Introduction
- Configuring Kali Linux
- Getting ready
- How to do it...
- How it works...
- Configuring the Xfce environment
- Configuring the Mate environment
- Configuring the LXDE environment
- Configuring the e17 environment
- Configuring the KDE environment
- Prepping up with custom tools
- Dnscan
- Subbrute
- Dirsearch
- Pentesting VPN's ike-scan
- Cracking the PSK
- Setting up proxychains
- Using proxychains with tor
- Going on a hunt with Routerhunter
- Chapter 2: Gathering Intel and Planning Attack Strategies
- Getting a list of subdomains
- Fierce
- DNSdumpster
- Using Shodan for fun and profit
- Shodan Honeyscore
- Shodan plugins
- See also
- Using Nmap to find open ports
- Using scripts
- Bypassing firewalls with Nmap
- TCP ACK scan
- TCP Window scan
- Idle scan
- Searching for open directories
- The dirb tool
- There's more...
- Performing deep magic with DMitry
- Hunting for SSL flaws
- Exploring connections with intrace
- Digging deep with theharvester
- How it works.
- Finding the technology behind web apps
- Scanning IPs with masscan
- Sniffing around with Kismet
- Testing routers with firewalk
- Chapter 3: Vulnerability Assessment
- Using the infamous Burp
- Exploiting WSDLs with Wsdler
- Using Intruder
- Web app pentest with Vega
- Exploring SearchSploit
- Exploiting routers with RouterSploit
- Using the scanners command
- Using creds
- Using Metasploit
- Automating Metasploit
- Writing a custom resource script
- Databases in Metasploit
- Chapter 4: Web App Exploitation - Beyond
- Exploiting XSS with XSS Validator
- Injection attacks with sqlmap
- Owning all .svn and .git repositories
- Winning race conditions
- Exploiting JBoss with JexBoss
- Exploiting PHP Object Injection
- Backdoors using web shells
- Backdoors using meterpreters
- Chapter 5: Network Exploitation on Current Exploitation
- Man in the middle with hamster and ferret
- Exploring the msfconsole
- Railgun in Metasploit
- Using the paranoid meterpreter
- A tale of a bleeding heart
- Redis exploitation
- Say no to SQL - owning MongoDBs
- How to do it.
- Embedded device hacking
- Elasticsearch exploit
- Good old Wireshark
- This is Sparta!
- Chapter 6: Wireless Attacks - Getting Past
- The good old Aircrack
- Hands on with Gerix
- Dealing with WPAs
- Owning employee accounts with Ghost Phisher
- Pixie dust attack
- Chapter 7: Password Attacks - The Fault
- Identifying different types of hash in the wild!
- MD5
- MySQL less than v4.1
- MD5 (WordPress)
- MySQL 5
- Base64 encoding
- Using hash-identifier
- Cracking with patator
- Cracking hashes online
- Hashkiller
- Crackstation
- OnlineHashCrack
- Playing with John the ripper
- Johnny Bravo!
- Using cewl
- Generating word list with crunch
- Chapter 8: Have Shell Now What?
- Spawning a TTY Shell
- Looking for weakness
- Horizontal escalation
- Vertical escalation
- Node hopping - pivoting
- There's more…
- Privilege escalation on Windows
- Using PowerSploit
- How to do it…
- Pulling plaintext passwords with mimikatz
- Dumping other saved passwords from the machine
- Pivoting into the network
- Backdooring for persistence
- Chapter 9: Buffer Overflows
- Exploiting stack-based buffer overflows
- Exploiting buffer overflow on real software
- SEH bypass
- Exploiting egg hunters
- An overview of ASLR and NX bypass
- Chapter 10: Playing with Software-Defined Radios
- Radio frequency scanners
- Hands-on with RTLSDR scanner
- Playing around with gqrx
- Kalibrating device for GSM tapping
- Decoding ADS-B messages with Dump1090
- Chapter 11: Kali in Your Pocket -NetHunters and Raspberries
- Installing Kali on Raspberry Pi
- Installing NetHunter
- Superman typing - HID attacks
- Can I charge my phone?
- Setting up an evil access point
- Chapter 12: Writing Reports
- Generating reports using Dradis
- Using MagicTree
- Index.
- Notes:
- Includes index.
- Description based on online resource; title from PDF title page (EBC, viewed February 6, 2018).
- OCLC:
- 1011595388
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.