Book description
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!
About This Book
- Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before
- Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town-Kali Linux 2 (aka Sana).
- Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother
Who This Book Is For
If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.
What You Will Learn
- Find out to download and install your own copy of Kali Linux
- Properly scope and conduct the initial stages of a penetration test
- Conduct reconnaissance and enumeration of target networks
- Exploit and gain a foothold on a target system or network
- Obtain and crack passwords
- Use the Kali Linux NetHunter install to conduct wireless penetration testing
- Create proper penetration testing reports
In Detail
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux ? Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.
Style and approach
This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.
Table of contents
-
Kali Linux 2 – Assuring Security by Penetration Testing Third Edition
- Table of Contents
- Kali Linux 2 – Assuring Security by Penetration Testing Third Edition
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
-
1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
-
2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
-
Security testing methodologies
- Open Source Security Testing Methodology Manual
- Information Systems Security Assessment Framework
- Open Web Application Security Project
- Web Application Security Consortium Threat Classification
- Key features and benefits of WASC-TC
- Penetration Testing Execution Standard
- Key features and benefits of PTES
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- 3. Target Scoping
- 4. Information Gathering
- 5. Target Discovery
-
6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- 7. Vulnerability Mapping
- 8. Social Engineering
- 9. Target Exploitation
- 10. Privilege Escalation
- 11. Maintaining Access
- 12. Wireless Penetration Testing
- 13. Kali Nethunter
- 14. Documentation and Reporting
- A. Supplementary Tools
- B. Key Resources
- Index
Product information
- Title: Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
- Author(s):
- Release date: September 2016
- Publisher(s): Packt Publishing
- ISBN: 9781785888427
You might also like
book
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to …
book
Learn Ethical Hacking from Scratch
Learn how to hack systems like black hat hackers and secure them like security experts Key …
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …