Kali Linux Cookbook.
A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Packt Publishing,
2013.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Up and Running with Kali Linux; Introduction; Installing to a hard disk drive; Installing to a USB drive with persistent memory; Installing in VirtualBox; Installing VMware Tools; Fixing the splash screen; Starting network services; Setting up the wireless network; Chapter 2: Customizing Kali Linux; Introduction; Preparing kernel headers; Installing Broadcom drivers; Installing and configuring ATI video card drivers; Installing and configuring nVidia video card drivers.
- Applying updates and configuring extra security toolsSetting up ProxyChains; Directory encryption; Chapter 3: Advanced Testing Lab; Introduction; Getting comfortable with VirtualBox; Downloading Windows Targets; Downloading Linux Targets; Attacking WordPress and other applications; Chapter 4: Information Gathering; Introduction; Service enumeration; Determining network range; Identifying active machines; Finding open ports; Operating system fingerprinting; Service fingerprinting; Threat assessment with Maltego; Mapping the network; Chapter 5: Vulnerability Assessment; Introduction.
- Installing, configuring, and starting NessusNessus
- finding local vulnerabilities; Nessus
- finding network vulnerabilities; Nessus
- finding Linux-specific vulnerabilities; Nessus
- finding Windows-specific vulnerabilities; Installing, configuring, and starting OpenVAS; OpenVAS
- finding local vulnerabilities; OpenVAS
- finding network vulnerabilities; OpenVAS
- finding Linux-specific vulnerabilities; OpenVAS
- finding Windows-specific vulnerabilities; Chapter 6: Exploiting Vulnerabilities; Introduction; Installing and configuring Metasploitable.
- Mastering Armitage, the graphical management tool for MetasploitMastering the Metasploit Console (MSFCONSOLE); Mastering the Metasploit CLI (MSFCLI); Mastering Meterpreter; Metasploitable MySQL; Metasploitable PostgreSQL; Metasploitable Tomcat; Metasploitable PDF; Implementing browser_autopwn; Chapter 7: Escalating Privileges; Introduction; Using impersonation tokens; Local privilege escalation attack; Mastering the Social Engineering Toolkit (SET); Collecting the victim's data; Cleaning up the tracks; Creating a persistent backdoor; Man In The Middle (MITM) attack.
- Chapter 8: Password AttacksIntroduction; Online password attacks; Cracking HTTP passwords; Gaining router access; Password profiling; Cracking a Windows password using John the Ripper; Using dictionary attacks; Using rainbow tables; Using nVidia Compute Unified Device Architecture (CUDA); Using ATI Stream; Physical access attacks; Chapter 9: Wireless Attacks; Introduction; Wireless network WEP cracking; Wireless network WPA/WPA2 cracking; Automating wireless network cracking; Accessing clients using a fake AP; URL traffic manipulation; Port redirection; Sniffing network traffic; Index.