Kali Linux - An Ethical Hacker's Cookbook

Over 120 recipes to perform advanced penetration testing with Kali Linux
Preview in Mapt

Kali Linux - An Ethical Hacker's Cookbook

Himanshu Sharma

1 customer reviews
Over 120 recipes to perform advanced penetration testing with Kali Linux

Quick links: > What will you learn?> Table of content> Product reviews

Mapt Subscription
FREE
$29.99/m after trial
eBook
$5.00
RRP $35.99
Save 86%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$5.00
$44.99
$29.99 p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Kali Linux - An Ethical Hacker's Cookbook Book Cover
Kali Linux - An Ethical Hacker's Cookbook
$ 35.99
$ 5.00
Industrial Cybersecurity Book Cover
Industrial Cybersecurity
$ 35.99
$ 5.00
Buy 2 for $10.00
Save $61.98
Add to Cart

Book Details

ISBN 139781787121829
Paperback376 pages

Book Description

With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book’s crisp and task-oriented recipes.

Table of Contents

Chapter 1: Kali – An Introduction
Introduction
Configuring Kali Linux
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Pentesting VPN's ike-scan
Setting up proxychains
Going on a hunt with Routerhunter
Chapter 2: Gathering Intel and Planning Attack Strategies
Introduction
Getting a list of subdomains
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
Using Nmap to find open ports
Bypassing firewalls with Nmap
Searching for open directories
Performing deep magic with DMitry
Hunting for SSL flaws
Exploring connections with intrace
Digging deep with theharvester
Finding the technology behind web apps
Scanning IPs with masscan
Sniffing around with Kismet
Testing routers with firewalk
Chapter 3: Vulnerability Assessment
Introduction
Using the infamous Burp
Exploiting WSDLs with Wsdler
Using Intruder
Web app pentest with Vega
Exploring SearchSploit
Exploiting routers with RouterSploit
Using Metasploit
Automating Metasploit
Writing a custom resource script
Databases in Metasploit
Chapter 4: Web App Exploitation – Beyond OWASP Top 10
Introduction
Exploiting XSS with XSS Validator
Injection attacks with sqlmap
Owning all .svn and .git repositories
Winning race conditions
Exploiting JBoss with JexBoss
Exploiting PHP Object Injection
Backdoors using web shells
Backdoors using meterpreters
Chapter 5: Network Exploitation on Current Exploitation
Introduction
Man in the middle with hamster and ferret
Exploring the msfconsole
Railgun in Metasploit
Using the paranoid meterpreter
A tale of a bleeding heart
Redis exploitation
Say no to SQL – owning MongoDBs
Embedded device hacking
Elasticsearch exploit
Good old Wireshark
This is Sparta!
Chapter 6: Wireless Attacks – Getting Past Aircrack-ng
Introduction
Chapter 7: Password Attacks – The Fault in Their Stars
Introduction
Identifying different types of hash in the wild!
Using hash-identifier
Cracking with patator
Cracking hashes online
Playing with John the ripper
Johnny Bravo!
Using cewl
Generating word list with crunch
Chapter 8: Have Shell Now What?
Introduction
Spawning a TTY Shell
Looking for weakness
Horizontal escalation
Vertical escalation
Node hopping – pivoting
Privilege escalation on Windows
Using PowerSploit
Pulling plaintext passwords with mimikatz
Dumping other saved passwords from the machine
Pivoting into the network
Backdooring for persistence
Chapter 9: Buffer Overflows
Introduction
Exploiting stack-based buffer overflows
Exploiting buffer overflow on real software
SEH bypass
Exploiting egg hunters
An overview of ASLR and NX bypass
Chapter 10: Playing with Software-Defined Radios
Introduction
Radio frequency scanners
Hands-on with RTLSDR scanner
Playing around with gqrx
Kalibrating device for GSM tapping
Decoding ADS-B messages with Dump1090
Chapter 11: Kali in Your Pocket – NetHunters and Raspberries
Introduction
Installing Kali on Raspberry Pi
Installing NetHunter
Superman typing – HID attacks
Can I charge my phone?
Setting up an evil access point
Chapter 12: Writing Reports
Introduction
Generating reports using Dradis
Using MagicTree

What You Will Learn

  • Installing, setting up and customizing Kali for pentesting on multiple platforms
  • Pentesting routers and embedded devices
  • Bug hunting 2017
  • Pwning and escalating through corporate network
  • Buffer overflows 101
  • Auditing wireless networks
  • Fiddling around with software-defned radio
  • Hacking on the run with NetHunter
  • Writing good quality reports

Authors

Table of Contents

Chapter 1: Kali – An Introduction
Introduction
Configuring Kali Linux
Configuring the Xfce environment
Configuring the Mate environment
Configuring the LXDE environment
Configuring the e17 environment
Configuring the KDE environment
Prepping up with custom tools
Pentesting VPN's ike-scan
Setting up proxychains
Going on a hunt with Routerhunter
Chapter 2: Gathering Intel and Planning Attack Strategies
Introduction
Getting a list of subdomains
Using Shodan for fun and profit
Shodan Honeyscore
Shodan plugins
Using Nmap to find open ports
Bypassing firewalls with Nmap
Searching for open directories
Performing deep magic with DMitry
Hunting for SSL flaws
Exploring connections with intrace
Digging deep with theharvester
Finding the technology behind web apps
Scanning IPs with masscan
Sniffing around with Kismet
Testing routers with firewalk
Chapter 3: Vulnerability Assessment
Introduction
Using the infamous Burp
Exploiting WSDLs with Wsdler
Using Intruder
Web app pentest with Vega
Exploring SearchSploit
Exploiting routers with RouterSploit
Using Metasploit
Automating Metasploit
Writing a custom resource script
Databases in Metasploit
Chapter 4: Web App Exploitation – Beyond OWASP Top 10
Introduction
Exploiting XSS with XSS Validator
Injection attacks with sqlmap
Owning all .svn and .git repositories
Winning race conditions
Exploiting JBoss with JexBoss
Exploiting PHP Object Injection
Backdoors using web shells
Backdoors using meterpreters
Chapter 5: Network Exploitation on Current Exploitation
Introduction
Man in the middle with hamster and ferret
Exploring the msfconsole
Railgun in Metasploit
Using the paranoid meterpreter
A tale of a bleeding heart
Redis exploitation
Say no to SQL – owning MongoDBs
Embedded device hacking
Elasticsearch exploit
Good old Wireshark
This is Sparta!
Chapter 6: Wireless Attacks – Getting Past Aircrack-ng
Introduction
Chapter 7: Password Attacks – The Fault in Their Stars
Introduction
Identifying different types of hash in the wild!
Using hash-identifier
Cracking with patator
Cracking hashes online
Playing with John the ripper
Johnny Bravo!
Using cewl
Generating word list with crunch
Chapter 8: Have Shell Now What?
Introduction
Spawning a TTY Shell
Looking for weakness
Horizontal escalation
Vertical escalation
Node hopping – pivoting
Privilege escalation on Windows
Using PowerSploit
Pulling plaintext passwords with mimikatz
Dumping other saved passwords from the machine
Pivoting into the network
Backdooring for persistence
Chapter 9: Buffer Overflows
Introduction
Exploiting stack-based buffer overflows
Exploiting buffer overflow on real software
SEH bypass
Exploiting egg hunters
An overview of ASLR and NX bypass
Chapter 10: Playing with Software-Defined Radios
Introduction
Radio frequency scanners
Hands-on with RTLSDR scanner
Playing around with gqrx
Kalibrating device for GSM tapping
Decoding ADS-B messages with Dump1090
Chapter 11: Kali in Your Pocket – NetHunters and Raspberries
Introduction
Installing Kali on Raspberry Pi
Installing NetHunter
Superman typing – HID attacks
Can I charge my phone?
Setting up an evil access point
Chapter 12: Writing Reports
Introduction
Generating reports using Dradis
Using MagicTree

Book Details

ISBN 139781787121829
Paperback376 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Industrial Cybersecurity Book Cover
Industrial Cybersecurity
$ 35.99
$ 5.00
Digital Forensics and Incident Response Book Cover
Digital Forensics and Incident Response
$ 35.99
$ 5.00
Python Machine Learning - Second Edition Book Cover
Python Machine Learning - Second Edition
$ 31.99
$ 5.00
Understanding Software Book Cover
Understanding Software
$ 23.99
$ 5.00
Cybersecurity: Attack and Defense Strategies Book Cover
Cybersecurity: Attack and Defense Strategies
$ 31.99
$ 5.00
Kali Linux Wireless Penetration Testing Cookbook Book Cover
Kali Linux Wireless Penetration Testing Cookbook
$ 31.99
$ 5.00