Book description
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professional
Key Features
- Learn to compromise enterprise networks with Kali Linux
- Gain comprehensive insights into security concepts using advanced real-life hacker techniques
- Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment
- Purchase of the print or Kindle book includes a free eBook in the PDF format
Book Description
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment.
By the end of this Kali Linux book, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.
What you will learn
- Explore the fundamentals of ethical hacking
- Understand how to install and configure Kali Linux
- Perform asset and network discovery techniques
- Focus on how to perform vulnerability assessments
- Exploit the trust in Active Directory domain services
- Perform advanced exploitation with Command and Control (C2) techniques
- Implement advanced wireless hacking techniques
- Become well-versed with exploiting vulnerable web applications
Who this book is for
This pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.
Table of contents
- The Ultimate Kali Linux Book Second Edition
- Contributors
- About the author
- About the reviewer
- Preface
- Section 1: Getting Started with Penetration Testing
-
Chapter 1: Introduction to Ethical Hacking
- Identifying threat actors and their intent
- Understanding what matters to threat actors
- Discovering cybersecurity terminologies
- Exploring the need for penetration testing and its phases
- Understanding penetration testing approaches
- Exploring hacking phases
- Understanding the Cyber Kill Chain framework
- Summary
- Further reading
-
Chapter 2: Building a Penetration Testing Lab
- Technical requirements
- Understanding the lab overview and its technologies
- Setting up a hypervisor and virtually isolated networks
- Setting up and working with Kali Linux
- Deploying Metasploitable 2 as a target system
- Implementing Metasploitable 3 using Vagrant
- Setting up vulnerability web application systems
- Summary
- Further reading
-
Chapter 3: Setting Up for Advanced Hacking Techniques
- Technical requirements
-
Building an AD red team lab
- Part 1 – installing Windows Server 2019
- Part 2 – installing Windows 10 Enterprise
- Part 2 – setting up AD services
- Part 3 – promoting to a DC
- Part 4 – creating domain users and administrator accounts
- Part 5 – disabling antimalware protection and the domain firewall
- Part 6 – setting up for file sharing and service authentication attacks
- Part 7 – joining clients to the AD domain
- Part 8 – setting up for local account takeover and SMB attacks
- Setting up a wireless penetration testing lab
- Summary
- Further reading
- Section 2: Reconnaissance and Network Penetration Testing
- Chapter 4: Reconnaissance and Footprinting
-
Chapter 5: Exploring Active Information Gathering
- Technical requirements
- Understanding active reconnaissance
- Exploring Google hacking strategies
- Exploring DNS reconnaissance
- Enumerating subdomains
- Profiling websites using EyeWitness
- Exploring active scanning techniques
- Enumerating common network services
- Performing user enumeration through noisy authentication controls
- Finding data leaks in the cloud
- Summary
- Further reading
- Chapter 6: Performing Vulnerability Assessments
- Chapter 7: Understanding Network Penetration Testing
- Chapter 8: Performing Network Penetration Testing
- Section 3: Red Teaming Techniques
- Chapter 9: Advanced Network Penetration Testing — Post Exploitation
- Chapter 10: Working with Active Directory Attacks
- Chapter 11: Advanced Active Directory Attacks
- Chapter 12: Delving into Command and Control Tactics
-
Chapter 13: Advanced Wireless Penetration Testing
- Technical requirements
- Introduction to wireless networking
- Performing wireless reconnaissance
- Compromising WPA and WPA2 networks
- Performing AP-less attacks
- Exploiting enterprise wireless networks
- Creating a Wi-Fi honeypot
- Discovering WPA3 attacks
- Securing your wireless network
- Summary
- Further reading
- Section 4: Social Engineering and Web Application Attacks
- Chapter 14: Performing Client-Side Attacks – Social Engineering
-
Chapter 15: Understanding Website Application Security
- Technical requirements
- Understanding web applications
- Exploring the OWASP Top 10: 2021
- Getting started with FoxyProxy and Burp Suite
- Understanding injection-based attacks
- Exploring broken access control attacks
- Discovering cryptographic failures
- Understanding insecure design
- Exploring security misconfiguration
- Summary
- Further reading
-
Chapter 16: Advanced Website Penetration Testing
- Technical requirements
- Identifying vulnerable and outdated components
- Exploiting identification and authentication failures
- Understanding software and data integrity failures
- Understanding security logging and monitoring failures
- Performing server-side request forgery
- Automating SQL injection attacks
- Understanding cross-site scripting
- Performing client-side attacks
- Summary
- Further reading
- Chapter 17: Best Practices for the Real World
- Other Books You May Enjoy
Product information
- Title: The Ultimate Kali Linux Book - Second Edition
- Author(s):
- Release date: February 2022
- Publisher(s): Packt Publishing
- ISBN: 9781801818933
You might also like
book
The Ultimate Kali Linux Book - Third Edition
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch …
book
Learning Kali Linux, 2nd Edition
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to …
video
Linux Fundamentals, 2nd Edition
10+ Hours of Video Instruction More than 10 hours of video instruction to get you up …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …