Cargando…

Kali Linux Cookbook.

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: L. Pritchett, Willie
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2013.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Up and Running with Kali Linux; Introduction; Installing to a hard disk drive; Installing to a USB drive with persistent memory; Installing in VirtualBox; Installing VMware Tools; Fixing the splash screen; Starting network services; Setting up the wireless network; Chapter 2: Customizing Kali Linux; Introduction; Preparing kernel headers; Installing Broadcom drivers; Installing and configuring ATI video card drivers; Installing and configuring nVidia video card drivers.
  • Applying updates and configuring extra security toolsSetting up ProxyChains; Directory encryption; Chapter 3: Advanced Testing Lab; Introduction; Getting comfortable with VirtualBox; Downloading Windows Targets; Downloading Linux Targets; Attacking WordPress and other applications; Chapter 4: Information Gathering; Introduction; Service enumeration; Determining network range; Identifying active machines; Finding open ports; Operating system fingerprinting; Service fingerprinting; Threat assessment with Maltego; Mapping the network; Chapter 5: Vulnerability Assessment; Introduction.
  • Installing, configuring, and starting NessusNessus
  • finding local vulnerabilities; Nessus
  • finding network vulnerabilities; Nessus
  • finding Linux-specific vulnerabilities; Nessus
  • finding Windows-specific vulnerabilities; Installing, configuring, and starting OpenVAS; OpenVAS
  • finding local vulnerabilities; OpenVAS
  • finding network vulnerabilities; OpenVAS
  • finding Linux-specific vulnerabilities; OpenVAS
  • finding Windows-specific vulnerabilities; Chapter 6: Exploiting Vulnerabilities; Introduction; Installing and configuring Metasploitable.
  • Mastering Armitage, the graphical management tool for MetasploitMastering the Metasploit Console (MSFCONSOLE); Mastering the Metasploit CLI (MSFCLI); Mastering Meterpreter; Metasploitable MySQL; Metasploitable PostgreSQL; Metasploitable Tomcat; Metasploitable PDF; Implementing browser_autopwn; Chapter 7: Escalating Privileges; Introduction; Using impersonation tokens; Local privilege escalation attack; Mastering the Social Engineering Toolkit (SET); Collecting the victim's data; Cleaning up the tracks; Creating a persistent backdoor; Man In The Middle (MITM) attack.
  • Chapter 8: Password AttacksIntroduction; Online password attacks; Cracking HTTP passwords; Gaining router access; Password profiling; Cracking a Windows password using John the Ripper; Using dictionary attacks; Using rainbow tables; Using nVidia Compute Unified Device Architecture (CUDA); Using ATI Stream; Physical access attacks; Chapter 9: Wireless Attacks; Introduction; Wireless network WEP cracking; Wireless network WPA/WPA2 cracking; Automating wireless network cracking; Accessing clients using a fake AP; URL traffic manipulation; Port redirection; Sniffing network traffic; Index.