Book description
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition
Key Features
- Rely on the most updated version of Kali to formulate your pentesting strategies
- Test your corporate network against threats
- Explore new cutting-edge wireless penetration tools and features
Book Description
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.
This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.
By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.
What you will learn
- Conduct the initial stages of a penetration test and understand its scope
- Perform reconnaissance and enumeration of target networks
- Obtain and crack passwords
- Use Kali Linux NetHunter to conduct wireless penetration testing
- Create proper penetration testing reports
- Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing
- Carry out wireless auditing assessments and penetration testing
- Understand how a social engineering attack such as phishing works
Who this book is for
This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Contributors
- Preface
-
Installing and Configuring Kali Linux
- Technical requirements
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Setting up Kali Linux AMI on Amazon AWS Cloud
- Summary
- Questions
- Further reading
- Setting Up Your Test Lab
- Penetration Testing Methodology
-
Footprinting and Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Getting network routing information
- Utilizing the search engine
- Google Hacking Database (GHDB)
- Metagoofil
- Automated footprinting and information gathering tools
- Summary
- Questions
- Further reading
-
Scanning and Evasion Techniques
- Technical requirements
- Starting off with target discovery
- Identifying the target machine
- OS fingerprinting
- Introducing port scanning
- Understanding TCP/IP protocol
- Understanding TCP and UDP message formats
- The network scanner
- Scanning with Netdiscover
- Automated scanning with Striker
- Anonymity using Nipe
- Summary
- Questions
- Further Reading
- Vulnerability Scanning
- Social Engineering
- Target Exploitation
- Privilege Escalation and Maintaining Access
- Web Application Testing
- Wireless Penetration Testing
- Mobile Penetration Testing with Kali NetHunter
- PCI DSS Scanning and Penetration Testing
- Tools for Penetration Testing Reporting
-
Assessments
- Chapter 1 – Assessment answers
- Chapter 2 – Assessment answers
- Chapter 4 – Assessment answers
- Chapter 5 – Assessment answers
- Chapter 6 – Assessment answers
- Chapter 12 – Assessment answers
- Chapter 13 – Assessment answers
- Chapter 14 – Assessment answers
- Other Books You May Enjoy
Product information
- Title: Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
- Author(s):
- Release date: October 2018
- Publisher(s): Packt Publishing
- ISBN: 9781789341768
You might also like
book
Web Penetration Testing with Kali Linux - Third Edition
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
book
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud …
book
Kali Linux Penetration Testing Bible
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution …