Book description
Convert Android to a powerful pentesting platform.
Key Features
- Get up and running with Kali Linux NetHunter
- Connect your Android device and gain full control over Windows, OSX, or Linux devices
- Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data
Book Description
Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure.
Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem.
By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
What you will learn
- Choose and configure a hardware device to use Kali NetHunter
- Use various tools during pentests
- Understand NetHunter suite components
- Discover tips to effectively use a compact mobile platform
- Create your own Kali NetHunter-enabled device and configure it for optimal results
- Learn to scan and gather information from a target
- Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices
Who this book is for
Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Preface
- Section 1: Exploring Kali NetHunter
- Introduction to Kali NetHunter
- Understanding the Phases of the Pentesting Process
- Section 2: Common Pentesting Tasks and Tools
-
Intelligence-Gathering Tools
- Technical requirements
- Objectives of intelligence gathering
- Information for the taking
- Tools for gathering useful information
- Working with Recon-Ng
- Going for technical data
- Summary
- Further reading
-
Scanning and Enumeration Tools
- Technical requirements
- Scanning
- Determining whether a host is up or down
- Using Nmap
- Port scanning
- Full Open/TCP connect scans
- Stealth scans
- XMAS scans
- FIN scans
- NULL scans
- ACK scans
- Tuning and tweaking
- Banner grabbing
- Enumeration with NetHunter
- Enumerating DNS
- Enumerating SMTP
- Working with SMB
- Summary
- Further reading
- Penetrating the Target
- Clearing Tracks and Removing Evidence from a Target
- Section 3: Advanced Pentesting Tasks and Tools
- Packet Sniffing and Traffic Analysis
-
Targeting Wireless Devices and Networks
- Wireless network topologies
- Wireless standards
- Service Set Identifier
- Wireless authentication modes
- Wireless encryption standard
- Wireless threats
-
Wireless attacks
- Exercise – checking whether a wireless card supports injection
- Exercise – detecting access points and their manufacturers
- Exercise – discovering the WPS version of an access point
- Exercise – de-authentication attacks
- Exercise – de-authenticating a specific client
- Exercise – detecting a de-authentication attack
- Exercise – discovering hidden SSIDs
- Exercise – cracking WEP and WPA
- Bluetooth hacking
- Summary
- Avoiding Detection
- Hardening Techniques and Countermeasures
- Building a Lab
- Selecting a Kali Device and Hardware
- Other Books You May Enjoy
Product information
- Title: Hands-On Penetration Testing with Kali NetHunter
- Author(s):
- Release date: February 2019
- Publisher(s): Packt Publishing
- ISBN: 9781788995177
You might also like
book
Kali Linux Penetration Testing Bible
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution …
book
Web Penetration Testing with Kali Linux - Third Edition
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, …
book
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth …
book
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud …