๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Web Penetration Testing with Kali Linux

โœ Scribed by Joseph Muniz, Aamir Lakhani


Publisher
Packt Publishing
Year
2013
Tongue
English
Leaves
342
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.

Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.

"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.

You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.

On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.

Perform vulnerability reconnaissance to gather information on your targets
Expose server vulnerabilities and take advantage of them to gain privileged access
Exploit client-based systems using web application protocols
Learn how to use SQL and cross-site scripting (XSS) attacks
Steal authentications through session hijacking techniques
Harden systems so other attackers do not exploit them easily
Generate reports for penetration testers
Learn tips and trade secrets from real world penetration testers

โœฆ Table of Contents


Preface
Chapter 1: Penetration Testing and Setup
Chapter 2: Reconnaissance
Chapter 3: Server-side Attacks
Chapter 4: Client-side Attacks
Chapter 5: Attacking Authentication
Chapter 6: Web Attacks
Chapter 7: Defensive Countermeasures
Chapter 8: Penetration Test Executive Report
Index

Preface

Up

Chapter 1: Penetration Testing and Setup
    Web application Penetration Testing concepts
    Penetration Testing methodology
        Calculating risk
    Kali Penetration Testing concepts
        Step 1 โ€“ Reconnaissance
        Step 2 โ€“ Target evaluation
        Step 3 โ€“ Exploitation
        Step 4 โ€“ Privilege Escalation
        Step 5 โ€“ maintaining a foothold
    Introducing Kali Linux
    Kali system setup
        Running Kali Linux from external media
        Installing Kali Linux
        Kali Linux and VM image first run
    Kali toolset overview
    Summary

Up

Chapter 2: Reconnaissance
    Reconnaissance objectives
    Initial research
        Company website
        Web history sources
        Regional Internet Registries (RIRs)
        Electronic Data Gathering, Analysis, and Retrieval (EDGAR)
        Social media resources
        Trust
        Job postings
        Location
        Shodan
        Google hacking
        Google Hacking Database
        Researching networks
            HTTrack โ€“ clone a website
            ICMP Reconnaissance techniques
            DNS Reconnaissance techniques
            DNS target identification
            Maltego โ€“ Information Gathering graphs
        Nmap
            FOCA โ€“ website metadata Reconnaissance
    Summary

Up

Chapter 3: Server-side Attacks
    Vulnerability assessment
        Webshag
        Skipfish
        ProxyStrike
        Vega
        Owasp-Zap
        Websploit
    Exploitation
        Metasploit
        w3af
    Exploiting e-mail systems
    Brute-force attacks
        Hydra
        DirBuster
        WebSlayer
    Cracking passwords
        John the Ripper
    Man-in-the-middle
        SSL strip
            Starting the attack โ€“ redirection
            Setting up port redirection using Iptables
    Summary

Up

Chapter 4: Client-side Attacks
    Social engineering
    Social Engineering Toolkit (SET)
        Using SET to clone and attack
    MitM Proxy
    Host scanning
        Host scanning with Nessus
            Installing Nessus on Kali
            Using Nessus
    Obtaining and cracking user passwords
        Windows passwords
            Mounting Windows
            Linux passwords
    Kali password cracking tools
        Johnny
        hashcat and oclHashcat
        samdump2
        chntpw
        Ophcrack
        Crunch
    Other tools available in Kali
        Hash-identifier
        dictstat
        RainbowCrack (rcracki_mt)
        findmyhash
        phrasendrescher
        CmosPwd
        creddump
    Summary

Up

Chapter 5: Attacking Authentication
    Attacking session management
        Clickjacking
    Hijacking web session cookies
    Web session tools
        Firefox plugins
        Firesheep โ€“ Firefox plugin
        Web Developer โ€“ Firefox plugin
        Greasemonkey โ€“ Firefox plugin
        Cookie Injector โ€“ Firefox plugin
        Cookies Manager+ โ€“ Firefox plugin
        Cookie Cadger
        Wireshark
        Hamster and Ferret
        Man-in-the-middle attack
        dsniff and arpspoof
        Ettercap
        Driftnet
    SQL Injection
        sqlmap
    Cross-site scripting (XSS)
    Testing cross-site scripting
    XSS cookie stealing / Authentication hijacking
    Other tools
        urlsnarf
        acccheck
        hexinject
        Patator
        DBPwAudit
    Summary

Up

Chapter 6: Web Attacks
    Browser Exploitation Framework โ€“ BeEF
    FoxyProxy โ€“ Firefox plugin
    BURP Proxy
    OWASP โ€“ ZAP
    SET password harvesting
    Fimap
    Denial of Services (DoS)
        THC-SSL-DOS
        Scapy
        Slowloris
    Low Orbit Ion Cannon
    Other tools
        DNSCHEF
        SniffJoke
        Siege
        Inundator
        TCPReplay
    Summary

Up

Chapter 7: Defensive Countermeasures
    Testing your defenses
        Baseline security
        STIG
        Patch management
        Password policies
    Mirror your environment
        HTTrack
        Other cloning tools
    Man-in-the-middle defense
        SSL strip defense
    Denial of Service defense
    Cookie defense
    Clickjacking defense
    Digital forensics
        Kali Forensics Boot
            Filesystem analysis with Kali
        dc3dd
        Other forensics tools in Kali
            chkrootkit
            Autopsy
            Binwalk
            pdf-parser
            Foremost
            Pasco
            Scalpel
            bulk_extractor
    Summary

Up

Chapter 8: Penetration Test Executive Report
    Compliance
    Industry standards
    Professional services
    Documentation
    Report format
        Cover page
        Confidentiality statement
        Document control
        Timeline
        Executive summary
        Methodology
        Detailed testing procedures
        Summary of findings
        Vulnerabilities
        Network considerations and recommendations
        Appendices
        Glossary
    Statement of Work (SOW)
        External Penetration Testing
        Additional SOW material
    Kali reporting tools
        Dradis
        KeepNote
        Maltego CaseFile
        MagicTree
        CutyCapt
        Sample reports
    Summary

Index


๐Ÿ“œ SIMILAR VOLUMES


Web Penetration Testing with Kali Linux
โœ Joseph Muniz, Aamir Lakhani ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p>A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux </p> <p><b>Overview</b></p> <ul> <li>Learn key reconnaissance concepts needed as a penetration tester</li> <li>Attack and exploit key features, authentication

Web Penetration Testing with Kali Linux
โœ Joseph Muniz; Aamir Lakhani ๐Ÿ“‚ Library ๐Ÿ› Packt Pub Limited ๐ŸŒ English

Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for

Web Penetration Testing with Kali Linux
โœ Gilberto Najera-Gutierrez, Juned Ahmed Ansari ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

About the Author Gilberto Najera-Gutierrez is an experienced penetration tester currently working for one of the top security testing service providers in Australia. He obtained leading security and penetration testing certifications, namely Offensive Security Certified Professional (OSCP), EC-Coun

Web Penetration Testing with Kali Linux
โœ Muniz, Joseph, Lakhani, Aamir ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Packt Publishing ๐ŸŒ English

In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even thou

Web Penetration Testing with Kali Linux
โœ Gilberto Najera-Gutierrez ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes</b><p><b>About This Book</b><p><li>Know how to set up your lab with Kali Linux<li>Discover the core concepts of web penetration testing<li