Description |
1 online resource (1 volume) : illustrations. |
Series |
Community experience distilled |
|
Community experience distilled.
|
Note |
Includes index. |
Contents |
Cover ; Copyright; Credits; Disclaimer; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Beginning with Kali Linux ; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing kali on a virtual machine; Saving or Moving the Virtual Machine; Installing Kali on a USB disk; Configuring the Virtual Machine; VirtualBox Guest Additions; Setting up Networking; Setting up a wired connection. |
|
Setting up a wireless connectionUpdating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology ; Types of penetration testing; Black box testing; White box testing; Gray box testing; Deciding on a test; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual; Key features and benefits of OSSTMM. |
|
Information Systems Security Assessment FrameworkKey features and benefits of ISSAF; Open Web Application Security Project; Key features and benefits of OWASP; Web Application Security Consortium Threat Classification; Key features and benefits of WASC-TC; Penetration Testing Execution Standard; Key features and benefits of PTES; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics. |
|
SimplyEmailMetagoofil; Accessing leaked information; The Onion Router; Installing the TOR Browser; Summary; Chapter 5: Target Discovery ; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target ; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; The network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification. |
Summary |
Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester. |
Subject |
Kali Linux.
|
|
Kali Linux |
|
Computer security.
|
|
Computers -- Access control.
|
|
Computer Security |
|
Sécurité informatique. |
|
Ordinateurs -- Accès -- Contrôle. |
|
Computer security |
|
Computers -- Access control |
Added Author |
Heriyanto, Tedi, author.
|
|
Allen, Lee (Information security specialist), author.
|
|
Ali, Shakeel, author.
|
ISBN |
9781785886065 |
|
1785886061 |
|
1785888420 |
|
9781785888427 |
|