▶Book Description
Kali Linux, a successor to BackTrack, is one of the most popular Linux distributions used by security professionals and penetration testers to identify and exploit vulnerabilities in the target environment.
As a tester or security practitioner, you'll be taken through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. You'll start by setting up a laboratory environment to validate an application using pentesting tools and techniques. You'll then cover passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll learn how to select, use, customize, and interpret results from different vulnerability scanners, and examine specific routes to the target, such as bypassing physical security and data exfiltration techniques. This Kali Linux book covers concepts such as attacking wireless networks, web services, and embedded devices and gives insights into social engineering.
Once you are confident with these topics, you'll delve into the practical aspects of attacking user client systems by backdooring with fileless techniques, and then shift focus to the most vulnerable part of the network – directly attacking the end user.
By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, and understand pentesting and hacking techniques employed on embedded peripheral devices.
▶What You Will Learn
⦁ Configure the most effective Kali Linux tools to test infrastructure security
⦁ Leverage Kali Linux to avoid detection in a controlled infrastructure
⦁ Exploit networks and data systems using wired and wireless networks as well as web services
⦁ Identify and download valuable data from target systems
⦁ Maintain access to compromised systems
⦁ Use social engineering to compromise the weakest part of a network - the end users
▶Key Features
⦁ Employ advanced pentesting techniques with Kali Linux to build highly secure systems
⦁ Discover stealth techniques to go undetected and penetrate modern infrastructures
⦁ Explore red teaming techniques to exploit a secured environment
▶Who This Book Is For
This third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, or security consultant who wants to optimize infrastructure security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.
▶What this book covers
⦁ Chapter 1, Goal-Based Penetration Testing with Kali Linux, introduces a functional outline, based on the penetration-testing methodology, that will be used throughout the book. It ensures that a coherent and comprehensive approach to penetration testing will be followed.
⦁ Chapter 2, Open Source Intelligence and Passive Reconnaissance, provides background on how to gather information about a target using publicly-available sources, and discusses the tools that can simplify reconnaissance and information management.
⦁ Chapter 3, Active Reconnaissance of the External and Internal Networks, introduces you to stealthy approaches that can be used to gain information about the target, especially the information that identifies vulnerabilities to be exploited.
⦁ Chapter 4, Vulnerability Assessment, teaches you the semi-automated process of scanning a network and its devices to locate systems that are vulnerable to attack and compromise, and the process of taking all reconnaissance and vulnerability scan information, assessing it, and then creating a map to guide the penetration-testing process.
⦁ Chapter 5, Advanced Social Engineering and Physical Security, demonstrates why being able to physically access a system or interact with the humans who manage it provides the most successful route to exploitation.
⦁ Chapter 6, Wireless Attacks, provides a brief explanation of wireless technologies, and focuses instead on the common techniques used to compromise these networks by bypassing security.
⦁ Chapter 7, Exploiting Web-Based Applications, provides a brief overview of one of the most complex delivery phases to secure: web-based applications that are exposed to the public internet.
⦁ Chapter 8, Client-Side Exploitation, focuses on attacks against applications on the end user's systems, which are frequently not protected to the same degree as the organization's primary network.
⦁ Chapter 9, Bypassing Security Controls, demonstrates the most common security controls in place, identifies a systematic process for overcoming these controls, and demonstrates this using the tools from the Kali toolset.
⦁ Chapter 10, Exploitation, demonstrates the methodologies that can be used to find and execute exploits that allow a system to be compromised by an attacker.
⦁ Chapter 11, Action on the Objective, focuses on the immediate post-exploit activities, as well as the concept of horizontal escalation—the process of using an exploited system as a starting point to jump off to other systems on the network.
⦁ Chapter 12, Privilege Escalation, demonstrates how the penetration tester can own all aspects of a system's operations, and more importantly, how obtaining some access privileges will allow the tester to control all systems across a network.
⦁ Chapter 13, Command and Control, focuses on what a modern attacker would do to enable data to be exfiltrated to the attacker's location, while hiding the evidence of the attack.
⦁ Chapter 14, Embedded Devices and RFID Hacking, focuses on what a modern attacker would do to perform a structured attack on embedded devices, as well as the cloning of NFC cards, to achieve an objective.