Book description
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!
About This Book
- Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before
- Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town-Kali Linux 2 (aka Sana).
- Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother
Who This Book Is For
If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.
What You Will Learn
- Find out to download and install your own copy of Kali Linux
- Properly scope and conduct the initial stages of a penetration test
- Conduct reconnaissance and enumeration of target networks
- Exploit and gain a foothold on a target system or network
- Obtain and crack passwords
- Use the Kali Linux NetHunter install to conduct wireless penetration testing
- Create proper penetration testing reports
In Detail
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux ? Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.
Style and approach
This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.
Table of contents
-
Kali Linux 2 – Assuring Security by Penetration Testing Third Edition
- Table of Contents
- Kali Linux 2 – Assuring Security by Penetration Testing Third Edition
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
-
1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
-
2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
-
Security testing methodologies
- Open Source Security Testing Methodology Manual
- Information Systems Security Assessment Framework
- Open Web Application Security Project
- Web Application Security Consortium Threat Classification
- Key features and benefits of WASC-TC
- Penetration Testing Execution Standard
- Key features and benefits of PTES
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- 3. Target Scoping
- 4. Information Gathering
- 5. Target Discovery
-
6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- 7. Vulnerability Mapping
- 8. Social Engineering
- 9. Target Exploitation
- 10. Privilege Escalation
- 11. Maintaining Access
- 12. Wireless Penetration Testing
- 13. Kali Nethunter
- 14. Documentation and Reporting
- A. Supplementary Tools
- B. Key Resources
- Index
Product information
- Title: Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
- Author(s):
- Release date: September 2016
- Publisher(s): Packt Publishing
- ISBN: 9781785888427
You might also like
book
Kali Linux – Assuring Security by Penetration Testing
With Kali Linux you can test the vulnerabilities of your network and then take steps to …
book
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
book
Kali Linux Web Penetration Testing Cookbook - Second Edition
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's …