Kali Linux - Assuring Security by Penetration Testing

With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.

Kali Linux - Assuring Security by Penetration Testing

Lee Allen, Tedi Heriyanto, Shakeel Ali

1 customer reviews
With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.
Mapt Subscription
FREE
$29.99/m after trial
eBook
$18.90
RRP $26.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$18.90
$44.99
$29.99p/m after trial
RRP $26.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781849519489
Paperback454 pages

Book Description

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux - Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.

Table of Contents

Chapter 1: Beginning with Kali Linux
A brief history of Kali Linux
Kali Linux tool categories
Downloading Kali Linux
Using Kali Linux
Configuring the virtual machine
Updating Kali Linux
Network services in Kali Linux
Installing a vulnerable server
Installing additional weapons
Summary
Chapter 2: Penetration Testing Methodology
Types of penetration testing
Vulnerability assessment versus penetration testing
Security testing methodologies
Penetration Testing Execution Standard (PTES)
General penetration testing framework
The ethics
Summary
Chapter 3: Target Scoping
Gathering client requirements
Preparing the test plan
Profiling test boundaries
Defining business objectives
Project management and scheduling
Summary
Chapter 4: Information Gathering
Using public resources
Querying the domain registration information
Analyzing the DNS records
Getting network routing information
Utilizing the search engine
Summary
Chapter 5: Target Discovery
Starting off with target discovery
Identifying the target machine
OS fingerprinting
Summary
Chapter 6: Enumerating Target
Introducing port scanning
The network scanner
SMB enumeration
SNMP enumeration
VPN enumeration
Summary
Chapter 7: Vulnerability Mapping
Types of vulnerabilities
Vulnerability taxonomy
Open Vulnerability Assessment System (OpenVAS)
Cisco analysis
Fuzz analysis
SMB analysis
SNMP analysis
Web application analysis
Summary
Chapter 8: Social Engineering
Modeling the human psychology
Attack process
Attack methods
Scarcity
Social relationship
Social Engineering Toolkit (SET)
Summary
Chapter 9: Target Exploitation
Vulnerability research
Vulnerability and exploit repositories
Advanced exploitation toolkit
Summary
Chapter 10: Privilege Escalation
Privilege escalation using a local exploit
Password attack tools
Network spoofing tools
Network sniffers
Summary
Chapter 11: Maintaining Access
Using operating system backdoors
Working with tunneling tools
Creating web backdoors
Summary
Chapter 12: Documentation and Reporting
Documentation and results verification
Types of reports
Network penetration testing report (sample contents)
Preparing your presentation
Post-testing procedures
Summary

What You Will Learn

  • Develop the Kali Linux environment in your test lab by installing, configuring, running, and updating its core system components
  • Perform a formal Kali Linux testing methodology
  • Scope your target with definitive test requirements, limitations, business objectives, and schedule the test plan
  • Exercise a number of security tools from Kali Linux, logically divided into subcategories of testing methodology
  • Practice the processes of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to target for evaluation purposes
  • Document, report, and present your verified test results to the relevant authorities in a formal reporting structure

Authors

Table of Contents

Chapter 1: Beginning with Kali Linux
A brief history of Kali Linux
Kali Linux tool categories
Downloading Kali Linux
Using Kali Linux
Configuring the virtual machine
Updating Kali Linux
Network services in Kali Linux
Installing a vulnerable server
Installing additional weapons
Summary
Chapter 2: Penetration Testing Methodology
Types of penetration testing
Vulnerability assessment versus penetration testing
Security testing methodologies
Penetration Testing Execution Standard (PTES)
General penetration testing framework
The ethics
Summary
Chapter 3: Target Scoping
Gathering client requirements
Preparing the test plan
Profiling test boundaries
Defining business objectives
Project management and scheduling
Summary
Chapter 4: Information Gathering
Using public resources
Querying the domain registration information
Analyzing the DNS records
Getting network routing information
Utilizing the search engine
Summary
Chapter 5: Target Discovery
Starting off with target discovery
Identifying the target machine
OS fingerprinting
Summary
Chapter 6: Enumerating Target
Introducing port scanning
The network scanner
SMB enumeration
SNMP enumeration
VPN enumeration
Summary
Chapter 7: Vulnerability Mapping
Types of vulnerabilities
Vulnerability taxonomy
Open Vulnerability Assessment System (OpenVAS)
Cisco analysis
Fuzz analysis
SMB analysis
SNMP analysis
Web application analysis
Summary
Chapter 8: Social Engineering
Modeling the human psychology
Attack process
Attack methods
Scarcity
Social relationship
Social Engineering Toolkit (SET)
Summary
Chapter 9: Target Exploitation
Vulnerability research
Vulnerability and exploit repositories
Advanced exploitation toolkit
Summary
Chapter 10: Privilege Escalation
Privilege escalation using a local exploit
Password attack tools
Network spoofing tools
Network sniffers
Summary
Chapter 11: Maintaining Access
Using operating system backdoors
Working with tunneling tools
Creating web backdoors
Summary
Chapter 12: Documentation and Reporting
Documentation and results verification
Types of reports
Network penetration testing report (sample contents)
Preparing your presentation
Post-testing procedures
Summary

Book Details

ISBN 139781849519489
Paperback454 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Instant Penetration Testing: Setting Up a Test Lab How-to Book Cover
Instant Penetration Testing: Setting Up a Test Lab How-to
$ 14.99
$ 10.50
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Kali Linux Cookbook Book Cover
Kali Linux Cookbook
$ 24.99
$ 5.00
Network Analysis using Wireshark Cookbook Book Cover
Network Analysis using Wireshark Cookbook
$ 29.99
$ 6.00
Linux Shell Scripting Cookbook, Second Edition Book Cover
Linux Shell Scripting Cookbook, Second Edition
$ 26.99
$ 5.40