Hacking with Kali - 1st Edition - ISBN: 9780124077492, 9780124078833

Hacking with Kali

1st Edition

Practical Penetration Testing Techniques

Authors: James Broad Andrew Bindner
eBook ISBN: 9780124078833
Paperback ISBN: 9780124077492
Imprint: Syngress
Published Date: 4th December 2013
Page Count: 238
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
31.95
22.36
22.36
22.36
22.36
22.36
25.56
25.56
24.99
17.49
17.49
17.49
17.49
17.49
19.99
19.99
39.95
27.96
27.96
27.96
27.96
27.96
31.96
31.96
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services.

Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Key Features

  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the Kali information, resources and distribution downloads
  • Hands-on exercises reinforce topics

Readership

Information Security professionals of all levels, hackers, systems administrators, network administrators, beginning and intermediate professional Pen Testers, and an academic audience among information security majors.

Table of Contents

Dedication

Chapter 1. Introduction

Information in This Chapter

Book Overview and Key Learning Points

Book Audience

Diagrams, Figures, and Screen Captures

Welcome

Penetration Testing Lifecycle

Terms

Kali History

References

Chapter 2. Download and Install Kali Linux

Information in This Chapter

Chapter Overview and Key Learning Points

Kali Linux

System Information

Downloading Kali

Hard Drive Installation

Thumb Drive Installation

SD Card Installation

Summary

Chapter 3. Software, Patches, and Upgrades

Information in This Chapter

Chapter Overview and Key Learning Points

APT Package Handling Utility

Debian Package Manager

Tarballs

A Practical Guide to Installing Nessus

Conclusion

Chapter 4. Configuring Kali Linux

Information in This Chapter

Chapter Overview and Key Learning Points

About This Chapter

The Basics of Networking

Using the Graphical User Interface to Configure Network Interfaces

Using the Command Line to Configure Network Interfaces

Using the GUI to Configure Wireless Cards

Web Server

FTP Server

SSH Server

Configure and Access External Media

Updating Kali

Upgrading Kali

Adding a Repository Source

Summary

Chapter 5. Building a Penetration Testing Lab

Information in This Chapter

Chapter Overview and Key Learning Points

Before Reading This Chapter: Build a Lab

Building a Lab on a Dime

Metasploitable2

Extending Your Lab

The Magical Code Injection Rainbow

Chapter 6. Introduction to the Penetration Test Lifecycle

Information in This Chapter

Chapter Overview And Key Learning Points

Introduction to the Lifecycle

Phase 1: Reconnaissance

Phase 2: Scanning

Phase 3: Exploitation

Phase 4: Maintaining Access

Phase 5: Reporting

Summary

Chapter 7. Reconnaissance

Information in This Chapter

Chapter Overview and Key Learning Points

Introduction

Start with the Targets Own Website

Website Mirroring

Google Searches

Google Hacking

Social Media

Job Sites

DNS and DNS Attacks

Query a Name Server

Zone Transfer

Reference

Chapter 8. Scanning

Information in This Chapter

Chapter Overview and Key Learning Points

Introduction to Scanning

Understanding Network Traffic

NMAP the King of Scanners

Selecting Ports

HPING3

Nessus

Summary

Chapter 9. Exploitation

Information in This Chapter

Chapter Overview and Key Learning Points

Introduction

An Overview of Metasploit

Accessing Metasploit

Web Server and Web Application Exploitation

Conclusion

Chapter 10. Maintaining Access

Information in This Chapter

Chapter Overview and Key Learning Points

Introduction

Terminology and Core Concepts

Backdoors

Keyloggers

Summary

Reference

Chapter 11. Reports and Templates

Information in This Chapter

Chapter Overview and Key Learning Points

Reporting

Presentation

Report and Evidence Storage

Summary

Appendix A. Tribal Chicken

Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5

Materials List

Install and Configure Ubuntu

Install Kali Linux 1.0.5

Customize the Interface

Running Updates

Building an ISO using Tribal Chicken

Burning an ISO to a DVD or Blu-Ray Disc

Testing and Validation (Short Version)

Appendix B. Kali Penetration Testing Tools

Index

Details

No. of pages:
238
Language:
English
Copyright:
© Syngress 2014
Published:
Imprint:
Syngress
eBook ISBN:
9780124078833
Paperback ISBN:
9780124077492

About the Author

James Broad

James Broad (CISSP, C|EH, CPTS, Security+, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation’s most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Affiliations and Expertise

President and Owner, Cyber-Recon, LLC.

Andrew Bindner

Affiliations and Expertise

Senior Security Consultant, CDW