Kali Linux 2: Windows Penetration Testing

Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Kali Linux 2: Windows Penetration Testing

Wolf Halton, Bo Weaver

3 customer reviews
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
Mapt Subscription
FREE
$29.99/m after trial
eBook
$28.00
RRP $39.99
Save 29%
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$28.00
$49.99
$29.99p/m after trial
RRP $39.99
RRP $49.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781782168492
Paperback422 pages

Book Description

Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS.

This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important.

Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.

Table of Contents

Chapter 1: Sharpening the Saw
Installing Kali Linux to an encrypted USB drive
Running Kali from the live CD
Installing and configuring applications
Setting up and configuring OpenVAS
Reporting the tests
Running services on Kali Linux
Exploring the Kali Linux Top 10 and more
Summary
Chapter 2: Information Gathering and Vulnerability Assessment
Footprinting the network
Where can you find instructions on this thing?
A return to OpenVAS
Using Maltego
Using Unicorn-Scan
Monitoring resource use with Htop
Monkeying around the network
Summary
Chapter 3: Exploitation Tools (Pwnage)
Choosing the appropriate time and tool
Choosing the right version of Metasploit
Starting Metasploit
Creating workspaces to organize your attack
Using the hosts and services commands
Using advanced footprinting
Using the pivot
Creating the attack path
Summary
Chapter 4: Web Application Exploitation
Surveying the webscape
Arm yourself with Armitage
Zinging Windows servers with OWASP ZAP
Search and destroy with Burp Suite
Summary
Chapter 5: Sniffing and Spoofing
Sniffing and spoofing network traffic
Sniffing network traffic
Spoofing network traffic
Summary
Chapter 6: Password Attacks
Password attack planning
My friend Johnny
John the Ripper (command line)
xHydra
Adding a tool to the main menu in Kali 2.x
Summary
Chapter 7: Windows Privilege Escalation
Gaining access with Metasploit
Replacing the executable
Local privilege escalation with a standalone tool
Escalating privileges with physical access
Weaseling in with Weevely
Summary
Chapter 8: Maintaining Remote Access
Maintaining access
Maintaining access with Ncat
The Dropbox
Cracking the NAC (Network Access Controller)
Creating a Spear-Phishing Attack with the Social Engineering Toolkit
Using Backdoor-Factory to Evade Antivirus
Summary
Chapter 9: Reverse Engineering and Stress Testing
Setting up a test environment
Reverse engineering theory
Working with Boolean logic
Practicing reverse engineering
Stresstesting Windows
Summary
Chapter 10: Forensics
Getting into Digital Forensics
Exploring Guymager
Diving into Autopsy
Mounting image files
Summary

What You Will Learn

  • Set up Kali Linux for pen testing
  • Map and enumerate your Windows network
  • Exploit several common Windows network vulnerabilities
  • Attack and defeat password schemes on Windows
  • Debug and reverse-engineer Windows programs
  • Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files
  • Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done

Authors

Table of Contents

Chapter 1: Sharpening the Saw
Installing Kali Linux to an encrypted USB drive
Running Kali from the live CD
Installing and configuring applications
Setting up and configuring OpenVAS
Reporting the tests
Running services on Kali Linux
Exploring the Kali Linux Top 10 and more
Summary
Chapter 2: Information Gathering and Vulnerability Assessment
Footprinting the network
Where can you find instructions on this thing?
A return to OpenVAS
Using Maltego
Using Unicorn-Scan
Monitoring resource use with Htop
Monkeying around the network
Summary
Chapter 3: Exploitation Tools (Pwnage)
Choosing the appropriate time and tool
Choosing the right version of Metasploit
Starting Metasploit
Creating workspaces to organize your attack
Using the hosts and services commands
Using advanced footprinting
Using the pivot
Creating the attack path
Summary
Chapter 4: Web Application Exploitation
Surveying the webscape
Arm yourself with Armitage
Zinging Windows servers with OWASP ZAP
Search and destroy with Burp Suite
Summary
Chapter 5: Sniffing and Spoofing
Sniffing and spoofing network traffic
Sniffing network traffic
Spoofing network traffic
Summary
Chapter 6: Password Attacks
Password attack planning
My friend Johnny
John the Ripper (command line)
xHydra
Adding a tool to the main menu in Kali 2.x
Summary
Chapter 7: Windows Privilege Escalation
Gaining access with Metasploit
Replacing the executable
Local privilege escalation with a standalone tool
Escalating privileges with physical access
Weaseling in with Weevely
Summary
Chapter 8: Maintaining Remote Access
Maintaining access
Maintaining access with Ncat
The Dropbox
Cracking the NAC (Network Access Controller)
Creating a Spear-Phishing Attack with the Social Engineering Toolkit
Using Backdoor-Factory to Evade Antivirus
Summary
Chapter 9: Reverse Engineering and Stress Testing
Setting up a test environment
Reverse engineering theory
Working with Boolean logic
Practicing reverse engineering
Stresstesting Windows
Summary
Chapter 10: Forensics
Getting into Digital Forensics
Exploring Guymager
Diving into Autopsy
Mounting image files
Summary

Book Details

ISBN 139781782168492
Paperback422 pages
Read More
From 3 reviews

Read More Reviews

Recommended for You

Kali Linux Network Scanning Cookbook Book Cover
Kali Linux Network Scanning Cookbook
$ 30.99
$ 21.70
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Kali Linux - Assuring Security by Penetration Testing Book Cover
Kali Linux - Assuring Security by Penetration Testing
$ 26.99
$ 18.90
Mastering Kali Linux for Advanced Penetration Testing Book Cover
Mastering Kali Linux for Advanced Penetration Testing
$ 32.99
$ 23.10
Kali Linux Wireless Penetration Testing: Beginner's Guide Book Cover
Kali Linux Wireless Penetration Testing: Beginner's Guide
$ 35.99
$ 25.20
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00