Book description
Over 80 recipes to effectively test your network and boost your career in security
About This Book
- Learn how to scan networks to find vulnerable computers and servers
- Hack into devices to control them, steal their data, and make them yours
- Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux
Who This Book Is For
If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux
What You Will Learn
- Acquire the key skills of ethical hacking to perform penetration testing
- Learn how to perform network reconnaissance
- Discover vulnerabilities in hosts
- Attack vulnerabilities to take control of workstations and servers
- Understand password cracking to bypass security
- Learn how to hack into wireless networks
- Attack web and database servers to exfiltrate data
- Obfuscate your command and control connections to avoid firewall and IPS detection
In Detail
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.
This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.
Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.
Style and approach
This book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.
Table of contents
- Preface
-
Installing Kali and the Lab Setup
- Introduction
- Lab architecture and considerations
- Installing VirtualBox
- Installing Kali on VirtualBox
- Using Kali Linux from bootable media
- Upgrading Kali Linux
- Understanding the advanced customization and optimization of Kali
- Installing Windows machines
- Installing Metasploitable
- Installing OWASP-BWA
- Understanding hack me and other online resources
-
Reconnaissance and Scanning
- Introduction
- Using KeepNote to organize our data
- Getting up and running with Maltego CE
- Gathering domain information
- Gathering public IP information
- Gathering external routing information
- Gathering internal routing information
- Gathering cloud service information
- Identifying network hosts
- Profiling hosts
- Identifying whether there is a web application firewall
- Using SNMP to gather more information
-
Vulnerability Analysis
- Introduction
- Installation and configuration of OpenVAS
- A basic vulnerability scanning with OpenVAS
- Advanced vulnerability scanning with OpenVAS
- Installation and Configuration of Nessus
- A basic vulnerability scanning with Nessus
- Advanced vulnerability scanning with Nessus
- The installation and configuration of Nexpose
- Basic vulnerability scanning with Nexpose
- Advanced vulnerability scanning with Nexpose
- Finding Exploits in the Target
- Social Engineering
-
Password Cracking
- Introduction
- Resetting local Windows machine password
- Cracking remote Windows machine passwords
- Windows domain password attacks
- Cracking local Linux password hashes
- Cracking password hashes with a wordlist
- Brute force password hashes
- Cracking FTP passwords
- Cracking Telnet and SSH passwords
- Cracking RDP and VNC passwords
- Cracking ZIP file passwords
- Privilege Escalation
- Wireless Specific Recipes
- Web and Database Specific Recipes
- Maintaining Access
Product information
- Title: Kali Linux Cookbook - Second Edition
- Author(s):
- Release date: September 2017
- Publisher(s): Packt Publishing
- ISBN: 9781784390303
You might also like
book
Kali Linux Network Scanning Cookbook - Second Edition
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help …
book
Learning Kali Linux
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. …
book
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration …
book
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to …