
- 510 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
About this book
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.About This Book• Employ advanced pentesting techniques with Kali Linux to build highly-secured systems• Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches• Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costsWho This Book Is ForPenetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn• Select and configure the most effective tools from Kali Linux to test network security• Employ stealth to avoid detection in the network being tested• Recognize when stealth attacks are being used against your network• Exploit networks and data systems using wired and wireless networks as well as web services• Identify and download valuable data from target systems• Maintain access to compromised systems• Use social engineering to compromise the weakest part of the network—the end usersIn DetailThis book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testingStyle and approachAn advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Active Reconnaissance of External and Internal Networks

- Stealth scanning strategies
- External and internal infrastructure, host discovery, and enumeration
- The comprehensive reconnaissance of applications, especially using recon-ng
- The enumeration of internal hosts using DHCP
- Useful Microsoft Windows commands for penetration testing
- Taking advantage of default configurations
Stealth scanning strategies
- Camouflage tool signatures to avoid detection or triggering an alarm
- Hide the attack within legitimate traffic
- Modify the attack to hide the source and type of traffic
- Make the attack invisible using nonstandard traffic types or encryption
- Adjusting the source IP stack and tool identification settings
- Modifying packet parameters (nmap)
- Using proxies with anonymity networks (ProxyChains and the Tor network)
Adjusting the source IP stack and tool identification settings

Modifying packet parameters
- Attackers approach the target with a goal in mind and send the minimum number of packets needed to determine the objective. For example, if you wish to confirm the presence of a web host, you first need to determine whether port 80, the default port for web-based services, is open.
- Avoid scans that may connect with the target system and leak data. Do not ping the target or use synchronize (SYN) and nonconventional packet scans, such as acknowledge (ACK), finished (FIN), and reset (RST) packets.
- Randomize or spoof packet settings, such as the source IP and port address, and the MAC address.
- Adjust the timing to slow the arrival of packets at the target site.
- Change the packet size by fragmenting packets or appending random data to confuse packet inspection devices.
#nmap --spoof-mac Cisco --data-length 24 -T paranoid --max-hostgroup 1 --max-parallelism 10 -Pn -f -D 10.1.20.5,RND:5,ME -v -n -sS -sV -oA /desktop/pentest/nmap/out -p T:1-1024 --randomize-hosts 10.1.1.10 10.1.1.15
| Command | Rationale |
| --spoof-mac-Cisco | Spoofs the MAC address... |
Table of contents
- Title Page
- Copyright
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Customer Feedback
- Preface
- Goal-Based Penetration Testing
- Open Source Intelligence and Passive Reconnaissance
- Active Reconnaissance of External and Internal Networks
- Vulnerability Assessment
- Physical Security and Social Engineering
- Wireless Attacks
- Reconnaissance and Exploitation of Web-Based Applications
- Attacking Remote Access
- Client-Side Exploitation
- Bypassing Security Controls
- Exploitation
- Action on the Objective
- Privilege Escalation
- Command and Control
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app