Kali Linux 2 : assuring security by penetration testing /
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying o...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Edición: | Third edition. |
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Copyright
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Table of Contents
- Preface
- Chapter 1: Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Running Kali using Live DVD
- Installing on a hard disk
- Installing Kali on a physical machine
- Installing kali on a virtual machine
- Saving or Moving the Virtual Machine
- Installing Kali on a USB disk
- Configuring the Virtual Machine
- VirtualBox Guest Additions
- Setting up Networking
- Setting up a wired connection
- Setting up a wireless connection
- Updating Kali Linux
- Network services in Kali Linux
- HTTP
- MySQL
- SSH
- Installing a vulnerable server
- Installing additional weapons
- Installing the Nessus vulnerability scanner
- Installing the Cisco password cracker
- Summary
- Chapter 2: Penetration Testing Methodology
- Types of penetration testing
- Black box testing
- White box testing
- Gray box testing
- Deciding on a test
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- Open Source Security Testing Methodology Manual
- Key features and benefits of OSSTMM
- Information Systems Security Assessment Framework
- Key features and benefits of ISSAF
- Open Web Application Security Project
- Key features and benefits of OWASP
- Web Application Security Consortium Threat Classification
- Key features and benefits of WASC-TC
- Penetration Testing Execution Standard
- Key features and benefits of PTES
- General penetration testing framework
- Target scoping
- Information gathering
- Target discovery
- Enumerating target
- Vulnerability mapping
- Social engineering
- Target exploitation
- Privilege escalation
- Maintaining access
- Documentation and reporting.
- The ethics
- Summary
- Chapter 3: Target Scoping
- Gathering client requirements
- Creating the customer requirements form
- The deliverables assessment form
- Preparing the test plan
- The test plan checklist
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4 : Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Host
- dig
- dnsenum
- fierce
- DMitry
- Maltego
- Getting network routing information
- tcptraceroute
- tctrace
- Utilizing the search engine
- theharvester
- SimplyEmail
- Metagoofil
- Accessing leaked information
- The Onion Router
- Installing the TOR Browser
- Summary
- Chapter 5: Target Discovery
- Starting off with target discovery
- Identifying the target machine
- ping
- arping
- fping
- hping3
- nping
- alive6
- detect-new-ip6
- passive_discovery6
- nbtscan
- OS fingerprinting
- p0f
- Nmap
- Summary
- Chapter 6: Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Nmap
- Nmap target specification
- Nmap TCP scan options
- Nmap UDP scan options
- Nmap port specification
- Nmap output options
- Nmap timing options
- Useful Nmap options
- Service version detection
- Operating system detection
- Disabling host discovery
- Aggressive scan
- Nmap for scanning the IPv6 target
- The Nmap scripting engine
- Nmap options for Firewall/IDS evasion
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- onesixtyone
- snmpcheck
- VPN enumeration
- ike-scan
- Summary
- Chapter 7: Vulnerability Mapping
- Types of vulnerabilities
- Local vulnerability
- Remote vulnerability.
- Vulnerability taxonomy
- Automated vulnerability scanning
- Nessus
- Network vulnerability scanning
- Cisco analysis
- Cisco auditing tool
- Cisco global exploiter
- SMB analysis
- Impacketsamrdump
- SNMP analysis
- SNMP Walk
- Web application analysis
- Nikto2
- OWASP ZAP
- Burp Suite
- Paros proxy
- W3AF
- WafW00f
- WebScarab
- Fuzz analysis
- BED
- JBroFuzz
- Database assessment tools
- SQLMap
- SQL Ninja
- Summary
- Chapter 8: Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Impersonation
- Reciprocation
- Influential authority
- Scarcity
- Social relationship
- Curiosity
- Social Engineering Toolkit
- Anonymous USB Attack
- Summary
- Chapter 9: Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Scenario 1
- Scenario 2
- SMB usernames
- VNC blank authentication scanner
- PostGRESQL login
- Scenario 3
- Bind shell
- Reverse shell
- Meterpreter
- Scenario 4
- Generating a binary backdoor
- Automated browser exploitation
- Writing exploit modules
- Summary
- Chapter 10: Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Offline attack tools
- hash-identifier
- Hashcat
- RainbowCrack
- samdump2
- John
- Johnny
- Ophcrack
- Crunch
- Online attack tools
- CeWL
- Hydra
- Medusa
- Mimikatz
- Network spoofing tools
- DNSChef
- Setting up a DNS proxy
- Faking a domain
- arpspoof
- Ettercap
- Network sniffers
- dsniff
- tcpdump
- Wireshark
- Summary
- Chapter 11: Maintaining Access
- Using operating system backdoors
- Cymothoa
- Intersect
- The meterpreter backdoor
- Working with tunneling tools
- dns2tcp
- iodine
- Configuring the DNS server
- Running the iodine server.
- Running the iodine client
- ncat
- proxychains
- ptunnel
- socat
- Getting HTTP header information
- Transferring files
- sslh
- stunnel4
- Creating web backdoors
- WeBaCoo
- PHP meterpreter
- Summary
- Chapter 12: Wireless Penetration Testing
- Wireless networking
- Overview of 802.11
- Wired Equivalent Privacy Standard
- Wi-Fi Protected Access
- Wireless network recon
- Antennas
- Iwlist
- Kismet
- WAIDPS
- Wireless testing tools
- Aircrack-ng
- WPA Pre-shared Key cracking
- WEP cracking
- PixieWPS
- Wifite
- Fern Wifi Cracker
- Post cracking
- MAC spoofing
- Persistence
- Sniffing wireless traffic
- Sniffing WLAN traffic
- Passive sniffing
- Summary
- Chapter 13: Kali Nethunter
- Kali Nethunter
- Deployment
- Network deployment
- Wireless deployment
- Host deployment
- Installing Kali Nethunter
- Nethunter icons
- Nethunter tools
- Nmap
- Metasploit
- MAC changer
- Third-party applications
- Wireless attacks
- Wireless scanning
- Nethunter tools
- Third-party apps
- WPA/WPA2 cracking
- WPS cracking
- Evil AP attack
- Mana Evil AP
- HID attacks
- Summary
- Chapter 14: Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- Appendix A: Supplementary Tools
- Reconnaissance tool
- Vulnerability scanner
- NeXpose Community Edition
- Installing NeXpose
- Starting the NeXpose community
- Logging in to the NeXpose community
- Using the NeXpose community
- Web application tools
- Vega
- BlindElephant
- Network tool
- Netcat
- Open connection
- Service banner grabbing
- Creating a simple chat server
- File transfer
- Portscanning
- Backdoor shell.
- Reverse shell
- Summary
- Appendix B: Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index.