Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018,now with updated tools,4th Edition
Authors: Shiva V. N Parasram – Alex Samm – Damian Boodoo – Gerard Johansen – Lee Allen – Tedi Heriyanto – Shakeel Ali
ISBN-10: 1789341760
ISBN-13: 9781789341768
Publication Date 出版日期: 2018-10-26
Print Length 页数: 528 pages
Book Description
By finelybook
Achieve the gold standard in penetration testing with Kali using this masterpiece,now in its fourth edition
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify,detect,and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux,you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan,resulting in successful penetration testing project engagement.
This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning,vulnerability assessment,and exploitation. You’ll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters,you’ll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target,which can then be exploited. In the concluding chapters,you’ll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You’ll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network,including wireless networks.
By the end of this book,you will be able to use NetHunter,the mobile version of Kali Linux,and write a detailed report based on your findings.
What you will learn
Conduct the initial stages of a penetration test and understand its scope
Perform reconnaissance and enumeration of target networks
Obtain and crack passwords
Use Kali Linux NetHunter to conduct wireless penetration testing
Create proper penetration testing reports
Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing
Carry out wireless auditing assessments and penetration testing
Understand how a social engineering attack such as phishing works
contents
1 Installing and Configuring Kali Linux
2 Setting Up Your Test Lab
3 Penetration Testing Methodology
4 Footprinting and Information Gathering
5 Scanning and Evasion Techniques
6 Vulnerability Scanning
7 Social Engineering
8 Target Exploitation
9 Privilege Escalation and Maintaining Access
10 Web Application Testing
11 Wireless Penetration Testing
12 Mobile Penetration Testing with Kali NetHunter
13 PCI DSS Scanning and Penetration Testing
14 Tools for Penetration Testing Reporting