Embark on an exciting journey into the world of Kali Linux the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks Kali Linux empowers cybersecurity professionals
The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
β Scribed by Glen D. Singh
- Publisher
- Packt Publishing
- Year
- 2024
- Tongue
- English
- Leaves
- 278
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Learn to think like an adversary to strengthen your cyber defences
Execute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface level
Securely manipulate environments using Kali Linux, ensuring you're fully equipped to safeguard your systems against real-world threats
Book Description
Embark on an exciting journey into the world of Kali Linux β the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals.
In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux. Think of this book as your stepping stone into real-world situations that guides you through lab setups and core penetration testing concepts. As you progress in the book youβll explore the toolkit of vulnerability assessment tools in Kali Linux, where gathering information takes the spotlight. You'll learn how to find target systems, uncover device security issues, exploit network weaknesses, control operations, and even test web applications.
The journey ends with understanding complex web application testing techniques, along with industry best practices. As you finish this captivating exploration of the Kali Linux book, you'll be ready to tackle advanced enterprise network testing β with newfound skills and confidence.
β¦ Table of Contents
B21503_08
The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition
1 Introduction to Ethical Hacking
Join our book community on Discord
Understanding the need for cybersecurity
Identifying threat actors and their intent
Exploring cybersecurity terminologies
Understanding what matters to threat actors
Time
Resources
Financial factors
Hack value
Exploring the importance for penetration testing
Penetration testing Methodologies
Discovering penetration testing approaches
Types of penetration testing
Exploring penetration testing methodologies
Reconnaissance
Scanning and enumeration
Gaining access
Maintaining access
Covering tracks
Understanding the cyber kill chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control (C2)
Actions on objectives
Summary
Further Reading
2 Building a Penetration Testing Lab
Join our book community on Discord
Technical requirements
Understanding the lab overview and technologies
Setting up a hypervisor and virtual networks
Part 1 β Setting up the hypervisor
Part 2 β Creating virtually isolated networks
Setting up and working with Kali Linux
Part 1 β Deploying Kali Linux as a virtual machine
Part 2 β Customizing Kali Linux and its network adapters
Part 3 β Getting started with Kali Linux
Part 4 β Updating repository sources and packages
Setting up vulnerable web application
Deploying Metasploitable 2 as a vulnerable machine
Part 1 β Deploying Metasploitable 2
Part 2 β Configuring network settings
Building and deploying Metasploitable 3
Part 1 - Building the Windows Server version
Part 2 - Building the Linux server version
Summary
Further Reading
3 Setting up for Advanced Penetration Testing Techniques
Join our book community on Discord
Technical Requirements
Building an Active Directory red team lab
Part 1 β Setting up Windows Server
Part 2 β Configuring virtual machine additional features
Part 3 β Setting Active Directory Domain Services
Part 4 β Creating domain users and administrator accounts
Part 5 - Disabling antimalware protection and the domain firewall
Part 6 β Setting up for service authentication attacks
Part 7 β Installing Windows 10 Enterprise
Part 8 β Adding the clients to the domain
Part 9 β Setting up for account takeover and file sharing attacks
Setting up a wireless penetration testing lab
Setting up a RADIUS server
Summary
Further Reading
4 Passive Reconnaissace
Join our book community on Discord
Technical Requirements
Importance of reconnaissance
Exploring Passive reconnaissance
Open source intelligence
How much data should be collected
Creating a sock puppet
Anonymizing internet-based traffic
Virtual Private Network (VPN)
Proxychains
The Onion Router (TOR)
Summary
Further Reading
5 Exploring Open Source Intelligence
Join our book community on Discord
Technical Requirements
Google hacking techniques
Domain reconnaissance
Collecting WHOIS data
Performing DNS enumeration
Exploiting DNS zone transfer
Automation using Spiderfoot
Sub-domain harvesting
Enumeration with DNSmap
Sub-domain discovery with Sublist3r
Identifying organizational infrastructure
Data leakage on job websites
Finding vulnerable systems using Shodan
Discovering exposed systems with Censys
Mapping external systems using Maltego
Identifying infrastructure with Netcraft
Using Recon-ng for data harvesting
Data collection with theHarvester
Harvesting employeesβ data
Working with Hunter
Social media reconnaissance
Automating with Sherlock
Summary
Further Reading
6 Active Reconnaissance
Join our book community on Discord
Technical Requirements
Understanding active information
Profiling websites using EyeWitness
Exploring active scanning techniques
Changing your MAC address
Performing host discovery
Identifying open ports, services and operating systems
Using scanning evasion techniques
Enumerating network services
Enumerating SMB services
Enumerating SMTP services
Enumerating SNMP services
Discovering data leaks in the cloud
Summary
Further Reading
7 Performing Vulnerability Assessments
Join our book community on Discord
Technical Requirements
Getting started with Nessus
Part 1 β installing Nessus
Part 2 β identifying vulnerabilities
Part 3 β Vulnerability analysis
Part 4 β Exporting vulnerability reports
Vulnerability identification using Nmap
Working with Greenbone Vulnerability Manager
Part 1 β Installing GVM
Part 2 β vulnerability identification
Part 3 β vulnerability analysis and reporting
Using web application scanners
WhatWeb
Nmap
Nikto
Metasploit
WPScan
Summary
Further Reading
8 Understanding Network Penetration Testing
Join our book community on Discord
Technical Requirements
Introduction to network penetration testing
Working with bind and reverse shells
Remote shells using Netcat
Setting up a bind shell
Setting up reverse shells
Antimalware evasion techniques
Encoding payloads with MSFvenom
Creating custom payloads with Shellter
Working with wireless adapters
Connecting wireless adapters to Kali Linux
Connecting a wireless adapter with an RTL8812AU chipset
Managing and monitoring wireless modes
Configuring monitoring mode
Using Aircrack-ng to enable monitor mode
Summary
Further Reading
π SIMILAR VOLUMES
Embark on an exciting journey into the world of Kali Linux β the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity profession
<p><span>Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch </span></p><p><span>Purchase of the print or Kindle book includes a free eBook in PDF format.</span></p><p><span>Key Features</span></p><p><span>- Learn to think like an adversary to st
<p><span>Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch </span></p><p><span>Purchase of the print or Kindle book includes a free eBook in PDF format.</span></p><p><span>Key Features</span></p><p><span>- Learn to think like an adversary to st
<p><span>Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch</span></p><p><span>Purchase of the print or Kindle book includes a free eBook in PDF format.</span></p><p><span>Key Features</span></p><p><span>- Learn to think like an adversary to str
<span><p><b>Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch</b></p><h4>Key Features</h4><ul><li>Learn to compromise enterprise networks with Kali Linux</li><li>Gain comprehensive insights into security concepts using advanced real-life hacker techn