Summary
This chapter concludes reviewing various methods available in Kali Linux 1.0 that could be used to perform Penetration Testing against web application servers. At this point, readers should know how to research a target, identify vulnerabilities in that target, as well as all associated interactions with host and clients, exploit vulnerabilities, and interrupt services if desired. This text is a brief overview of tools available in Kali Linux; however, there are many other tools beyond Kali Linux that should be included in your Penetration Testing arsenal. Kali Linux offers a lot of value with native toolsets; however, the best Penetration Testers leverage tools beyond Kali, such as Day Zero type attacks based on custom scripts and utilities. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access