Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distributi...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing Ltd,
2019.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel
- The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team
- Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering
- Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise
- working with Nikto; What is robots.txt?; Using Parsero; Exercise
- working with Parsero; Using wget; Exercise
- working with wget; Using HTTrack; Exercise
- using HTTrack; Google Hacking; Exercise
- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise
- working with Echosec; Working with Recon-Ng
- Going for technical dataUsing WHOIS; Exercise
- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise
- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise
- working with ping; Using Nmap; Exercise
- Performing a Ping Sweep with Nmap; Port scanning