Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Безопасность, хакерство / Linux
Основная информация:
Название: Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Жанр: Нет
Автор: Ric Messier
Год выпуска: 2018
Формат: EPUB, PDF
Размер: 18.9 MB
ISBN: 978924849862
Язык: Английский
СКАЧАТЬ Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking БЕСПЛАТНО EPUB - DOC - DJVU - RTF - PDFОписание: The intention for this book is to teach readers about the capabilities of Kali Linux through the lens of security testing. The idea is to help you better understand how and why things work. Kali Linux is a security-oriented Linux distribution, so it ends up being popular with people who do security testing or penetration testing for either sport or vocation. While it does have its uses as a general-purpose Linux distribution and for use with forensicsand other related tasks, it really was designed with security testing in mind. As such, most of the book’s content focuses on using tools that Kali provides. Many of these tools are not necessarily easily available with other Linux distributions. While the tools can be installed, sometimes built from source, installation is easier if the package is in the distribution’s repository.
What This Book Covers:
- Foundations of Kali Linux
- Network Security Testing Basics
- Reconnaissance
- Looking for Vulnerabilities
Attacks against organizations arise from vulnerabilities. We’ll look at vulnerability scanners that can provide insight into the technical (as opposed to human) vulnerabilities that exist at your target organization. This will lead to hints on where to go from here, since the objective of security testing is to provide insights to the organization you are testing for about potential vulnerabilities and exposures. Identifying vulnerabilities will help you there.
- Automated Exploits
While Metasploit may be the foundation of performing security testing or penetration testing, other tools are available as well. We’ll cover the basics of using Metasploit but also cover some of the other tools available for exploiting the vulnerabilities found by the tools discussed in other parts of the book.
- Owning Metasploit
Metasploit is a dense piece of software. Getting used to using it effectively can take a long time. Nearly 2,000 exploits are available in Metasploit, as well as over 500 payloads. When you mix and match those, you get thousands of possibilities for interacting with remote systems. Beyond that, you can create your own modules. We’ll cover Metasploit beyond just the basics of using it for rudimentary exploits.
- Wireless Security Testing
- Web Application Testing
- Cracking Passwords
- Advanced Techniques and Concepts
- Reporting
Who This Book Is For:
While I hope there is something in this book for readers with a wide variety of experiences, the primary audience for the book is people who may have a little Linux or Unix experience but want to see what Kali is all about. This book is also for people who want to get a better handle on security testing by using the tools that Kali Linux has to offer.