Kali Linux Cookbook

Kali Linux Cookbook
eBook: $24.99
Formats: PDF, PacktLib, ePub and Mobi formats
save 15%!
Print + free eBook + free PacktLib access to the book: $66.98    Print cover: $41.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Table of Contents
Sample Chapters
  • Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
  • Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
  • Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

Book Details

Language : English
Paperback : 260 pages [ 235mm x 191mm ]
Release Date : October 2013
ISBN : 1783289597
ISBN 13 : 9781783289592
Author(s) : Willie L. Pritchett, David De Smet
Topics and Technologies : All Books, Networking and Servers, Open Source

Table of Contents

Chapter 1: Up and Running with Kali Linux
Chapter 2: Customizing Kali Linux
Chapter 3: Advanced Testing Lab
Chapter 4: Information Gathering
Chapter 5: Vulnerability Assessment
Chapter 6: Exploiting Vulnerabilities
Chapter 7: Escalating Privileges
Chapter 8: Password Attacks
Chapter 9: Wireless Attacks
  • Chapter 1: Up and Running with Kali Linux
    • Introduction
    • Installing to a hard disk drive
    • Installing to a USB drive with persistent memory
    • Installing in VirtualBox
    • Installing VMware Tools
    • Fixing the splash screen
    • Starting network services
    • Setting up the wireless network
    • Chapter 2: Customizing Kali Linux
      • Introduction
      • Preparing kernel headers
      • Installing Broadcom drivers
      • Installing and configuring ATI video card drivers
      • Installing and configuring nVidia video card drivers
      • Applying updates and configuring extra security tools
      • Setting up ProxyChains
      • Directory encryption
      • Chapter 3: Advanced Testing Lab
        • Introduction
        • Getting comfortable with VirtualBox
        • Downloading Windows Targets
        • Downloading Linux Targets
        • Attacking WordPress and other applications
        • Chapter 4: Information Gathering
          • Introduction
          • Service enumeration
          • Determining network range
          • Identifying active machines
          • Finding open ports
          • Operating system fingerprinting
          • Service fingerprinting
          • Threat assessment with Maltego
          • Mapping the network
          • Chapter 5: Vulnerability Assessment
            • Introduction
            • Installing, configuring, and starting Nessus
            • Nessus – finding local vulnerabilities
            • Nessus – finding network vulnerabilities
            • Nessus – finding Linux-specific vulnerabilities
            • Nessus – finding Windows-specific vulnerabilities
            • Installing, configuring, and starting OpenVAS
            • OpenVAS – finding local vulnerabilities
            • OpenVAS – finding network vulnerabilities
            • OpenVAS – finding Linux-specific vulnerabilities
            • OpenVAS – finding Windows-specific vulnerabilities
            • Chapter 6: Exploiting Vulnerabilities
              • Introduction
              • Installing and configuring Metasploitable
              • Mastering Armitage, the graphical management tool for Metasploit
              • Mastering the Metasploit Console (MSFCONSOLE)
              • Mastering the Metasploit CLI (MSFCLI)
              • Mastering Meterpreter
              • Metasploitable MySQL
              • Metasploitable PostgreSQL
              • Metasploitable Tomcat
              • Metasploitable PDF
              • Implementing browser_autopwn
              • Chapter 7: Escalating Privileges
                • Introduction
                • Using impersonation tokens
                • Local privilege escalation attack
                • Mastering the Social Engineering Toolkit (SET)
                • Collecting the victim's data
                • Cleaning up the tracks
                • Creating a persistent backdoor
                • Man In The Middle (MITM) attack
                • Chapter 8: Password Attacks
                  • Introduction
                  • Online password attacks
                  • Cracking HTTP passwords
                  • Gaining router access
                  • Password profiling
                  • Cracking a Windows password using John the Ripper
                  • Using dictionary attacks
                  • Using rainbow tables
                  • Using nVidia Compute Unified Device Architecture (CUDA)
                  • Using ATI Stream
                  • Physical access attacks
                  • Chapter 9: Wireless Attacks
                    • Introduction
                    • Wireless network WEP cracking
                    • Wireless network WPA/WPA2 cracking
                    • Automating wireless network cracking
                    • Accessing clients using a fake AP
                    • URL traffic manipulation
                    • Port redirection
                    • Sniffing network traffic

                    Willie L. Pritchett

                    Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure, data-driven, application development, and staffing services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifications and currently trains students on various topics including ethical hacking and penetration testing.

                    David De Smet

                    David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.
                    Sorry, we don't have any reviews for this title yet.

                    Submit Errata

                    Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.


                    - 1 submitted: last submission 16 Apr 2014

                    Category: Code | Page No: 115

                    In step number 5 on this page, the second command is:
                    openvasmd -rebuild

                    It should be:
                    openvasmd --rebuild

                    Sample chapters

                    You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

                    Frequently bought together

                    Kali Linux Cookbook +    Haskell Data Analysis Cookbook =
                    50% Off
                    the second eBook
                    Price for both: $40.55

                    Buy both these recommended eBooks together and get 50% off the cheapest eBook.

                    What you will learn from this book

                    • Install and setup Kali Linux on multiple platforms
                    • Customize Kali Linux to your individual needs
                    • Locate vulnerabilities with Nessus and OpenVAS
                    • Exploit vulnerabilities you've found with Metasploit
                    • Learn multiple solutions to escalate privileges on a compromised machine
                    • Understand how to use Kali Linux in all phases of a penetration test
                    • Crack WEP/WPA/WPA2 encryption
                    • Simulate an actual penetration test using Kali Linux

                    In Detail

                    In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

                    Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

                    Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!


                    A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

                    Who this book is for

                    This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

                    Code Download and Errata
                    Packt Anytime, Anywhere
                    Register Books
                    Print Upgrades
                    eBook Downloads
                    Video Support
                    Contact Us
                    Awards Voting Nominations Previous Winners
                    Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
                    Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software