Cargando…

Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /

""Kali Linux Network Scanning Cookbook"" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more adv...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hutchens, Justin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2014.
Colección:Quick answers to common problems.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Getting Started; Configuring a security lab with VMware Player (Windows); Configuring a security lab with VMware Fusion (Mac OS X); Installing Ubuntu Server; Installing Metasploitable2; Installing Windows Server; Increasing the Windows attack surface; Installing Kali Linux; Configuring and using SSH; Installing Nessus on Kali Linux; Configuring Burp Suite on Kali Linux; Using text editors (VIM and Nano); Chapter 2: Discovery Scanning.
  • Using Scapy to perform layer 2 discoveryUsing ARPing to perform layer 2 discovery; Using Nmap to perform layer 2 discovery; Using NetDiscover to perform layer 2 discovery; Using Metasploit to perform layer 2 discovery; Using ICMP ping to perform layer 3 discovery; Using Scapy to perform layer 3 discovery; Using Nmap to perform layer 3 discovery; Using fping to perform layer 3 discovery; Using hping3 to perform layer 3 discovery; Using Scapy to perform layer 4 discovery; Using Nmap to perform layer 4 discovery; Using hping3 to perform layer 4 discovery; Chapter 3: Port Scanning.
  • UDP port scanningTCP port scanning; UDP scanning with Scapy; UDP scanning with Nmap; UDP scanning with Metasploit; Stealth scanning with Scapy; Stealth scanning with Nmap; Stealth scanning with Metasploit; Stealth scanning with Hping3; Connect scanning with Scapy; Connect scanning with Nmap; Connect scanning with Metasploit; Connect scanning with Dmitry; TCP port scanning with Netcat; Zombie scanning with Scapy; Zombie scanning with Nmap; Chapter 4: Fingerprinting; Banner grabbing with Netcat; Banner grabbing with Python sockets; Banner grabbing with Dmitry; Banner grabbing with Nmap NSE.
  • Banner grabbing with AmapService identification with Nmap; Service identification with Amap; Operating system identification with Scapy; Operating system identification with Nmap; Operating system identification with xProbe2; Passive operating system identification with p0f; SNMP analysis with Onesixtyone; SNMP analysis with SNMPwalk; Firewall identification with Scapy; Firewall identification with Nmap; Firewall identification with Metasploit; Chapter 5: Vulnerability Scanning; Vulnerability scanning with Nmap Scripting Engine; Vulnerability scanning with MSF auxiliary modules.
  • Creating scan policies with NessusVulnerability scanning with Nessus; Command-line scanning with Nessuscmd; Validating vulnerabilities with HTTP interaction; Validating vulnerabilities with ICMP interaction; Chapter 6: Denial of Service; Fuzz testing to identify buffer overflows; Remote FTP service buffer overflow DoS; Smurf DoS attack; DNS amplification DoS attack; SNMP amplification DoS attack; NTP amplification DoS attack; SYN flood DoS attack; Sock stress DoS attack; DoS attacks with Nmap NSE; DoS attacks with Metasploit; DoS attacks with the exploit database.