Hacking with Kali

Hacking with Kali

Practical Penetration Testing Techniques

1st Edition - December 4, 2013
This is the Latest Edition
  • Authors: James Broad, Andrew Bindner
  • eBook ISBN: 9780124078833
  • Paperback ISBN: 9780124077492

Purchase options

Purchase options
DRM-free (EPub, PDF, Mobi)
Available
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Key Features

  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the Kali information, resources and distribution downloads
  • Hands-on exercises reinforce topics

Readership

Information Security professionals of all levels, hackers, systems administrators, network administrators, beginning and intermediate professional Pen Testers, and an academic audience among information security majors.

Table of Contents

  • Dedication

    Chapter 1. Introduction

    Information in This Chapter

    Book Overview and Key Learning Points

    Book Audience

    Diagrams, Figures, and Screen Captures

    Welcome

    Penetration Testing Lifecycle

    Terms

    Kali History

    References

    Chapter 2. Download and Install Kali Linux

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Kali Linux

    System Information

    Downloading Kali

    Hard Drive Installation

    Thumb Drive Installation

    SD Card Installation

    Summary

    Chapter 3. Software, Patches, and Upgrades

    Information in This Chapter

    Chapter Overview and Key Learning Points

    APT Package Handling Utility

    Debian Package Manager

    Tarballs

    A Practical Guide to Installing Nessus

    Conclusion

    Chapter 4. Configuring Kali Linux

    Information in This Chapter

    Chapter Overview and Key Learning Points

    About This Chapter

    The Basics of Networking

    Using the Graphical User Interface to Configure Network Interfaces

    Using the Command Line to Configure Network Interfaces

    Using the GUI to Configure Wireless Cards

    Web Server

    FTP Server

    SSH Server

    Configure and Access External Media

    Updating Kali

    Upgrading Kali

    Adding a Repository Source

    Summary

    Chapter 5. Building a Penetration Testing Lab

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Before Reading This Chapter: Build a Lab

    Building a Lab on a Dime

    Metasploitable2

    Extending Your Lab

    The Magical Code Injection Rainbow

    Chapter 6. Introduction to the Penetration Test Lifecycle

    Information in This Chapter

    Chapter Overview And Key Learning Points

    Introduction to the Lifecycle

    Phase 1: Reconnaissance

    Phase 2: Scanning

    Phase 3: Exploitation

    Phase 4: Maintaining Access

    Phase 5: Reporting

    Summary

    Chapter 7. Reconnaissance

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Introduction

    Start with the Targets Own Website

    Website Mirroring

    Google Searches

    Google Hacking

    Social Media

    Job Sites

    DNS and DNS Attacks

    Query a Name Server

    Zone Transfer

    Reference

    Chapter 8. Scanning

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Introduction to Scanning

    Understanding Network Traffic

    NMAP the King of Scanners

    Selecting Ports

    HPING3

    Nessus

    Summary

    Chapter 9. Exploitation

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Introduction

    An Overview of Metasploit

    Accessing Metasploit

    Web Server and Web Application Exploitation

    Conclusion

    Chapter 10. Maintaining Access

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Introduction

    Terminology and Core Concepts

    Backdoors

    Keyloggers

    Summary

    Reference

    Chapter 11. Reports and Templates

    Information in This Chapter

    Chapter Overview and Key Learning Points

    Reporting

    Presentation

    Report and Evidence Storage

    Summary

    Appendix A. Tribal Chicken

    Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5

    Materials List

    Install and Configure Ubuntu

    Install Kali Linux 1.0.5

    Customize the Interface

    Running Updates

    Building an ISO using Tribal Chicken

    Burning an ISO to a DVD or Blu-Ray Disc

    Testing and Validation (Short Version)

    Appendix B. Kali Penetration Testing Tools

    Index

Product details

  • No. of pages: 238
  • Language: English
  • Copyright: © Syngress 2013
  • Published: December 4, 2013
  • Imprint: Syngress
  • eBook ISBN: 9780124078833
  • Paperback ISBN: 9780124077492

About the Authors

James Broad

James Broad (CISSP, C|EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation’s most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Affiliations and Expertise

President and Owner, Cyber-Recon, LLC.

Andrew Bindner

Affiliations and Expertise

Senior Security Consultant, CDW