Book description
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services.
Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.
This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
- Provides detailed explanations of the complete penetration testing lifecycle
- Complete linkage of the Kali information, resources and distribution downloads
- Hands-on exercises reinforce topics
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Chapter 1. Introduction
- Chapter 2. Download and Install Kali Linux
- Chapter 3. Software, Patches, and Upgrades
-
Chapter 4. Configuring Kali Linux
- Information in This Chapter
- Chapter Overview and Key Learning Points
- About This Chapter
- The Basics of Networking
- Using the Graphical User Interface to Configure Network Interfaces
- Using the Command Line to Configure Network Interfaces
- Using the GUI to Configure Wireless Cards
- Web Server
- FTP Server
- SSH Server
- Configure and Access External Media
- Updating Kali
- Upgrading Kali
- Adding a Repository Source
- Summary
- Chapter 5. Building a Penetration Testing Lab
- Chapter 6. Introduction to the Penetration Test Lifecycle
- Chapter 7. Reconnaissance
- Chapter 8. Scanning
- Chapter 9. Exploitation
- Chapter 10. Maintaining Access
- Chapter 11. Reports and Templates
- Appendix A. Tribal Chicken
- Appendix B. Kali Penetration Testing Tools
- Index
Product information
- Title: Hacking with Kali
- Author(s):
- Release date: December 2013
- Publisher(s): Syngress
- ISBN: 9780124078833
You might also like
book
Web Penetration Testing with Kali Linux
Testing web security is best done through simulating an attack. Kali Linux lets you do this …
book
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you …
book
Kali Linux - An Ethical Hacker's Cookbook
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes …
book
Digital Forensics with Kali Linux
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using …