Cargando…

Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.

Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distributi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D.
Otros Autores: Oriyano, Sean-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2019.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel
  • The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team
  • Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering
  • Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise
  • working with Nikto; What is robots.txt?; Using Parsero; Exercise
  • working with Parsero; Using wget; Exercise
  • working with wget; Using HTTrack; Exercise
  • using HTTrack; Google Hacking; Exercise
  • what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise
  • working with Echosec; Working with Recon-Ng
  • Going for technical dataUsing WHOIS; Exercise
  • getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise
  • working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise
  • working with ping; Using Nmap; Exercise
  • Performing a Ping Sweep with Nmap; Port scanning