Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Learning Kali Linux

Security Testing, Penetration Testing, and Ethical Hacking

Paperback Engels 2018
Verkooppositie 1952
Verwachte levertijd ongeveer 8 werkdagen

Samenvatting

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test.

This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.
Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.

- Learn tools for stress testing network stacks and applications
- Perform network reconnaissance to determine what’s available to attackers
- Execute penetration tests using automated exploit tools such as Metasploit
- Use cracking tools to see if passwords meet complexity requirements
- Test wireless capabilities by injecting frames and cracking passwords
- Assess web application vulnerabilities with automated or proxy-based tools
- Create advanced attack techniques by extending Kali tools or developing your own
- Use Kali Linux to generate reports once testing is complete

Specificaties

ISBN13:9781492028697
Taal:Engels
Bindwijze:paperback
Aantal pagina's:384
Uitgever:O'Reilly
Druk:1
Verschijningsdatum:25-8-2018

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Ric Messier

Ric Messier, CEH, GCIH, GSEC, CISSP is a consultant, educator, and author of many books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor.

Andere boeken door Ric Messier

Inhoudsopgave

Preface
What This Book Covers
Who This Book Is For
The Value and Importance of Ethics
Conventions Used in This Book
Using Code Examples
O’Reilly Safari
How to Contact Us
Acknowledgments

1. Foundations of Kali Linux
Heritage of Linux
About Linux
Acquiring and Installing Kali Linux
Desktops
GNOME Desktop
Logging In Through the Desktop Manager
Xfce Desktop
Cinnamon and MATE
Using the Command Line
File and Directory Management
Process Management
Other Utilities
User Management
Service Management
Package Management
Log Management
Summary
Useful Resources

2. Network Security Testing Basics
Security Testing
Network Security Testing
Monitoring
Layers
Stress Testing
Denial-of-Service Tools
Encryption Testing
Packet Captures
Using tcpdump
Berkeley Packet Filters
Wireshark
Poisoning Attacks
ARP Spoofing
DNS Spoofing
Summary
Useful Resources

3. Reconnaissance
What Is Reconnaissance?
Open Source Intelligence
Google Hacking
Automating Information Grabbing
Recon-NG
Maltego
DNS Reconnaissance and whois
DNS Reconnaissance
Regional Internet Registries
Passive Reconnaissance
Port Scanning
TCP Scanning
UDP Scanning
Port Scanning with Nmap
High-Speed Scanning
Service Scanning
Manual Interaction
Summary
Useful Resources

4. Looking for Vulnerabilities
Understanding Vulnerabilities
Vulnerability Types
Buffer Overflow
Race Condition
Input Validation
Access Control
Local Vulnerabilities
Using lynis for Local Checks
OpenVAS Local Scanning
Root Kits
Remote Vulnerabilities
Quick Start with OpenVAS
Creating a Scan
OpenVAS Reports
Network Device Vulnerabilities
Auditing Devices
Database Vulnerabilities
Identifying New Vulnerabilities
Summary
Useful Resources

5. Automated Exploits
What Is an Exploit?
Cisco Attacks
Management Protocols
Other Devices
Exploit Database
Metasploit
Starting with Metasploit
Working with Metasploit Modules
Importing Data
Exploiting Systems
Armitage
Social Engineering
Summary
Useful Resources

6. Owning Metasploit
Scanning for Targets
Port Scanning
SMB Scanning
Vulnerability Scans
Exploiting Your Target
Using Meterpreter
Meterpreter Basics
User Information
Process Manipulation
Privilege Escalation
Pivoting to Other Networks
Maintaining Access
Summary
Useful Resources

7. Wireless Security Testing
The Scope of Wireless
802.11
Bluetooth
Zigbee
WiFi Attacks and Testing Tools
802.11 Terminology and Functioning
Identifying Networks
WPS Attacks
Automating Multiple Tests
Injection Attacks
Password Cracking on WiFi
besside-ng
coWPAtty
Aircrack-ng
Fern
Going Rogue
Hosting an Access Point
Phishing Users
Wireless Honeypot
Bluetooth Testing
Scanning
Service Identification
Other Bluetooth Testing
Zigbee Testing
Summary
Useful Resources

8. Web Application Testing
Web Architecture
Firewall
Load Balancer
Web Server
Application Server
Database Server
Web-Based Attacks
SQL Injection
XML Entity Injection
Command Injection
Cross-Site Scripting
Cross-Site Request Forgery
Session Hijacking
Using Proxies
Burp Suite
Zed Attack Proxy
WebScarab
Paros Proxy
Proxystrike
Automated Web Attacks
Recon
Vega
nikto
dirbuster and gobuster
Java-Based Application Servers
SQL-Based Attacks
Assorted Tasks
Summary
Useful Resources

9. Cracking Passwords
Password Storage
Security Account Manager
PAM and Crypt
Acquiring Passwords
Local Cracking
John the Ripper
Rainbow Tables
HashCat
Remote Cracking
Hydra
Patator
Web-Based Cracking
Summary
Useful Resources

10. Advanced Techniques and Concepts
Programming Basics
Compiled Languages
Interpreted Languages
Intermediate Languages
Compiling and Building
Programming Errors
Buffer Overflows
Heap Overflows
Return to libc
Writing Nmap Modules
Extending Metasploit
Disassembling and Reverse Engineering
Debugging
Disassembling
Tracing Programs
Other File Types
Maintaining Access and Cleanup
Metasploit and Cleanup
Maintaining Access
Summary
Useful Resources

11. Reporting
Determining Threat Potential and Severity
Writing Reports
Audience
Executive Summary
Methodology
Findings
Taking Notes
Text Editors
GUI-Based Editors
Notes
Capturing Data
Organizing Your Data
Dradis Framework
CaseFile
Summary
Useful Resources

Index

Managementboek TOP 5

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Learning Kali Linux