Book description
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.
About This Book
Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs
Who This Book Is For
Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.
What You Will Learn
Select and configure the most effective tools from Kali Linux to test network security
Employ stealth to avoid detection in the network being tested
Recognize when stealth attacks are being used against your network
Exploit networks and data systems using wired and wireless networks as well as web services
Identify and download valuable data from target systems
Maintain access to compromised systems
Use social engineering to compromise the weakest part of the network—the end users
In Detail
This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.
We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.
You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing
Style and approach
An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
Table of contents
- Title Page
- Copyright
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Customer Feedback
- Preface
-
Goal-Based Penetration Testing
- Conceptual overview of security testing
- Classical failures of vulnerability scanning, penetration testing, and red team exercises
- The testing methodology
- Introduction to Kali Linux – history and purpose
- Installing and updating Kali
- Using Kali from a portable device
- Installing Kali into a virtual machine
- VirtualBox
- Installing to a Docker appliance
- Installing Kali to the cloud – creating an AWS instance
- Organizing Kali
-
Configuring and customizing Kali
- Resetting the root password
- Adding a non-root user
- Speeding up Kali operations
- Sharing folders with the host operating system
- Using Bash scripts to customize Kali
- Building a verification lab
- Setting up a virtual network with Active Directory
- Installing defined targets
- Metasploitable3
- Mutillidae
- Managing collaborative penetration testing using Faraday
- Summary
- Open Source Intelligence and Passive Reconnaissance
-
Active Reconnaissance of External and Internal Networks
- Stealth scanning strategies
- DNS reconnaissance and route mapping
- Employing comprehensive reconnaissance applications
- Identifying the external network infrastructure
- Mapping beyond the firewall
- IDS/IPS identification
- Enumerating hosts
- Port, operating system, and service discovery
- Writing your own port scanner using netcat
-
Large-scale scanning
- DHCP information
- Identification and enumeration of internal network hosts
- Native MS Windows commands
- ARP broadcasting
- Ping sweep
- Using scripts to combine Masscan and nmap scans
- Taking advantage of SNMP
- Windows account information via Server Message Block (SMB) sessions
- Locating network shares
- Reconnaissance of active directory domain servers
- Using comprehensive tools (SPARTA)
- An example to configure SPARTA
- Summary
- Vulnerability Assessment
- Physical Security and Social Engineering
-
Wireless Attacks
- Configuring Kali for wireless attacks
- Wireless reconnaissance
- Bypassing a hidden SSID
- Bypassing MAC address authentication and open authentication
- Attacking WPA and WPA2
- DoS attacks against wireless communications
- Compromising enterprise implementations of WPA/WPA2
- Working with Ghost Phisher
- Summary
- Reconnaissance and Exploitation of Web-Based Applications
-
Attacking Remote Access
- Exploiting vulnerabilities in communication protocols
-
Attacking Secure Sockets Layer (SSL)
-
Weaknesses and vulnerabilities in the SSL protocol
- Browser Exploit Against SSL and TLS (BEAST)
- Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH)
- Compression Ratio Info-leak Made Easy (CRIME)
- Factoring Attack on RSA-EXPORT Keys (FREAK)
- Heartbleed
- Insecure TLS renegotiation
- Logjam attack
- Padding Oracle On Demanded Legacy Encryption (POODLE)
- Introduction to Testssl
- Reconnaissance of SSL connections
- Using sslstrip to conduct a man-in-the-middle attack
- Denial-of-service attacks against SSL
-
Weaknesses and vulnerabilities in the SSL protocol
- Attacking an IPSec virtual private network
- Summary
- Client-Side Exploitation
- Bypassing Security Controls
- Exploitation
- Action on the Objective
- Privilege Escalation
- Command and Control
Product information
- Title: Mastering Kali Linux for Advanced Penetration Testing - Second Edition
- Author(s):
- Release date: June 2017
- Publisher(s): Packt Publishing
- ISBN: 9781787120235
You might also like
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
book
Mastering Kali Linux for Web Penetration Testing
Master the art of exploiting advanced web penetration techniques with Kali Linux 2016.2 About This Book …
book
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth …
book
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud …