Kali Linux Cookbook - Second Edition
eBook - ePub

Kali Linux Cookbook - Second Edition

Corey P. Schultz, Bob Perciaccante

  1. 438 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Kali Linux Cookbook - Second Edition

Corey P. Schultz, Bob Perciaccante

Book details
Book preview
Table of contents
Citations

About This Book

Over 80 recipes to effectively test your network and boost your career in securityAbout This Book• Learn how to scan networks to find vulnerable computers and servers• Hack into devices to control them, steal their data, and make them yours• Target wireless networks, databases, and web servers, and password cracking to make the most of Kali LinuxWho This Book Is ForIf you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali LinuxWhat You Will Learn• Acquire the key skills of ethical hacking to perform penetration testing• Learn how to perform network reconnaissance• Discover vulnerabilities in hosts• Attack vulnerabilities to take control of workstations and servers• Understand password cracking to bypass security• Learn how to hack into wireless networks• Attack web and database servers to exfiltrate data• Obfuscate your command and control connections to avoid firewall and IPS detectionIn DetailKali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.Style and approachThis book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Kali Linux Cookbook - Second Edition an online PDF/ePUB?
Yes, you can access Kali Linux Cookbook - Second Edition by Corey P. Schultz, Bob Perciaccante in PDF and/or ePUB format, as well as other popular books in Informatica & Reti di computer. We have over one million books available in our catalogue for you to explore.

Information

Year
2017
ISBN
9781784394257
Edition
2

Installing Kali and the Lab Setup

In this chapter, we will cover the following topics:
  • Lab architecture and considerations
  • Installing VirtualBox
  • Installing Kali on VirtualBox
  • Using Kali Linux from bootable media
  • Upgrading Kali Linux
  • Understanding the advanced customization and optimization of Kali
  • Installing Windows machines
  • Installing Metasploitable
  • Installing OWASP-BWA
  • Understanding hack me and other online resources

Introduction

In order to set the stage for the rest of this book and to help you reproduce the recipes and their output, I strongly recommend that you create a test environment where you can run various tools that are included with Kali Linux. In this chapter, we will be focusing on building our testing environment based on free or low-cost applications to minimize cost.
Starting with installing the virtualization platform, VirtualBox, we will walk through a few common installation techniques for Kali Linux; you will also learn how to update and maintain your installation.

Lab architecture and considerations

In this section, we will discuss our lab design and provide some information that you can use to expand it in the future.
As we begin to set up our lab, we want to take some time to discuss the lab setup and some of the considerations that we will take when using the lab. Some of these considerations are designed to make the lab more effective, while others are used for the protection of the networks our lab is connected to. We also want you to be in a position to easily expand or grow this network with other test machines as you master the Kali recipes that follow.

How to do it...

In this section, we will be discussing general topics as opposed to specific recipes.

The hypervisor selection

Today, there are many different hypervisors that will allow you to run multiple virtual machines on a single physical machine. For our specific purposes, we have chosen to show you how to setup the initial lab in VirtualBox due to several compelling factors. It's free to use, has multi-platform support, and it's able to run within your main operating system. However, as we progress past the first chapter, we will be switching to VMware ESXi. This will not affect recipes in any way between using VirtualBox and VMware ESXi. Our main reason for switching is the amount of compute resources that are available to us in our dedicated lab. We have the ability to run many virtual machines at once, and we will have the ability to insert firewalls and other security devices between our Kali instance and our testing hosts, as needed. We also have the flexibility to create more complex environments.
If, for any reason, you are looking to build a larger test network or have a different hypervisor of choice that better suits your purposes, feel free to use it, as we will assume you will be able to translate our instructions between the different hypervisors.

The hypervisor networking

In our lab, we are going to be using two networks within VirtualBox: a NAT network and a host-only network. Our Kali box will be connected to both the networks, so it can communicate with devices on the internet, download updates, and get software packages as needed. Our target machines will only be connected to the host-only network. The host-only network can only talk within the host and among other devices connected to the host-only network. It cannot communicate through your Ethernet or wireless networks. This setup is extremely critical to our testing environment, as we do not ever want to expose our testing hosts to the outside world, as they are very vulnerable and will be hacked rather quickly.
To further protect the networks that your lab is connected to, we would actually suggest disconnecting the virtual adapter of the Kali virtual machine that connects to the NAT network, unless specifically required for the recipe operation. This way, your network is protected from accidental exposures to any attacks you may be sourcing f...

Table of contents

Citation styles for Kali Linux Cookbook - Second Edition

APA 6 Citation

Schultz, C., & Perciaccante, B. (2017). Kali Linux Cookbook - Second Edition (2nd ed.). Packt Publishing. Retrieved from https://www.perlego.com/book/527199/kali-linux-cookbook-second-edition-pdf (Original work published 2017)

Chicago Citation

Schultz, Corey, and Bob Perciaccante. (2017) 2017. Kali Linux Cookbook - Second Edition. 2nd ed. Packt Publishing. https://www.perlego.com/book/527199/kali-linux-cookbook-second-edition-pdf.

Harvard Citation

Schultz, C. and Perciaccante, B. (2017) Kali Linux Cookbook - Second Edition. 2nd edn. Packt Publishing. Available at: https://www.perlego.com/book/527199/kali-linux-cookbook-second-edition-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Schultz, Corey, and Bob Perciaccante. Kali Linux Cookbook - Second Edition. 2nd ed. Packt Publishing, 2017. Web. 14 Oct. 2022.