Kali Linux - An Ethical Hacker's Cookbook

Author: Himanshu Sharma  

Publisher: Packt Publishing‎

Publication year: 2017

E-ISBN: 9781787120280

P-ISBN(Paperback): 9781787121829

Subject: TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Chapter

Chapter 1: Kali – An Introduction

Introduction

Configuring Kali Linux

Getting ready

How to do it...

How it works...

Configuring the Xfce environment

How to do it...

Configuring the Mate environment

How to do it...

Configuring the LXDE environment

How to do it...

Configuring the e17 environment

How to do it...

Configuring the KDE environment

How to do it...

Prepping up with custom tools

Getting ready

How to do it...

Dnscan

Subbrute

Dirsearch

Pentesting VPN's ike-scan

Getting ready

How to do it...

Cracking the PSK

How it works...

Setting up proxychains

How to do it...

Using proxychains with tor

Going on a hunt with Routerhunter

Getting ready

How to do it...

Chapter 2: Gathering Intel and Planning Attack Strategies

Introduction

Getting a list of subdomains

Fierce

How to do it...

DNSdumpster

How to do it...

Using Shodan for fun and profit

Getting ready

How to do it...

Shodan Honeyscore

How to do it...

Shodan plugins

How to do it...

See also

Using Nmap to find open ports

How to do it...

Using scripts

See also

Bypassing firewalls with Nmap

TCP ACK scan

How to do it...

How it works...

TCP Window scan

How to do it...

Idle scan

How to do it...

How it works...

Searching for open directories

The dirb tool

How to do it...

There's more...

See also

Performing deep magic with DMitry

How to do it...

Hunting for SSL flaws

How to do it...

See also

Exploring connections with intrace

How to do it...

Digging deep with theharvester

How to do it...

How it works...

Finding the technology behind web apps

How to do it...

Scanning IPs with masscan

How to do it...

Sniffing around with Kismet

How to do it...

Testing routers with firewalk

How to do it...

How it works...

Chapter 3: Vulnerability Assessment

Introduction

Using the infamous Burp

How to do it...

Exploiting WSDLs with Wsdler

How to do it...

Using Intruder

How to do it...

Web app pentest with Vega

Getting ready

How to do it...

Exploring SearchSploit

How to do it...

Exploiting routers with RouterSploit

Getting ready

How to do it...

Using the scanners command

Using creds

Using Metasploit

How to do it...

Automating Metasploit

How to do it...

Writing a custom resource script

How to do it...

Databases in Metasploit

How to do it...

Chapter 4: Web App Exploitation – Beyond

Introduction

Exploiting XSS with XSS Validator

Getting ready

How to do it...

Injection attacks with sqlmap

How to do it...

See also

Owning all .svn and .git repositories

How to do it...

Winning race conditions

How to do it...

See also

Exploiting JBoss with JexBoss

How to do it...

Exploiting PHP Object Injection

How to do it...

See also

Backdoors using web shells

How to do it...

Backdoors using meterpreters

How to do it...

Chapter 5: Network Exploitation on Current Exploitation

Introduction

Man in the middle with hamster and ferret

Getting ready

How to do it...

Exploring the msfconsole

How to do it...

Railgun in Metasploit

How to do it...

There's more...

Using the paranoid meterpreter

How to do it...

There's more...

A tale of a bleeding heart

How to do it...

Redis exploitation

How to do it...

Say no to SQL – owning MongoDBs

Getting ready

How to do it...

Embedded device hacking

How to do it...

Elasticsearch exploit

How to do it...

See also

Good old Wireshark

Getting ready

How to do it...

There's more...

This is Sparta!

Getting ready

How to do it...

Chapter 6: Wireless Attacks – Getting Past

Introduction

The good old Aircrack

Getting ready

How to do it...

How it works...

Hands on with Gerix

Getting ready

How to do it...

Dealing with WPAs

How to do it...

Owning employee accounts with Ghost Phisher

How to do it...

Pixie dust attack

Getting ready

How to do it...

There's more...

Chapter 7: Password Attacks – The Fault

Introduction

Identifying different types of hash in the wild!

How to do it...

MD5

MySQL less than v4.1

MD5 (WordPress)

MySQL 5

Base64 encoding

There's more...

Using hash-identifier

How to do it...

Cracking with patator

How to do it...

Cracking hashes online

How to do it...

Hashkiller

Crackstation

OnlineHashCrack

Playing with John the ripper

How to do it...

There's more...

Johnny Bravo!

How to do it...

Using cewl

How to do it...

Generating word list with crunch

How to do it...

Chapter 8: Have Shell Now What?

Introduction

Spawning a TTY Shell

How to do it...

There's more...

Looking for weakness

How to do it...

Horizontal escalation

How to do it...

Vertical escalation

How to do it...

Node hopping – pivoting

How to do it...

There's more…

Privilege escalation on Windows

How to do it...

Using PowerSploit

How to do it…

There's more…

Pulling plaintext passwords with mimikatz

How to do it…

Dumping other saved passwords from the machine

How to do it...

Pivoting into the network

How to do it...

Backdooring for persistence

How to do it...

Chapter 9: Buffer Overflows

Introduction

Exploiting stack-based buffer overflows

How to do it...

Exploiting buffer overflow on real software

Getting ready

How to do it...

SEH bypass

How to do it...

See also

Exploiting egg hunters

Getting ready

How to do it...

See also

An overview of ASLR and NX bypass

How to do it...

See also

Chapter 10: Playing with Software-Defined Radios

Introduction

Radio frequency scanners

Getting ready

How to do it...

Hands-on with RTLSDR scanner

How to do it...

Playing around with gqrx

How to do it...

There's more...

Kalibrating device for GSM tapping

How to do it...

There's more...

Decoding ADS-B messages with Dump1090

How to do it...

There's more...

Chapter 11: Kali in Your Pocket –NetHunters and Raspberries

Introduction

Installing Kali on Raspberry Pi

Getting ready

How to do it...

Installing NetHunter

Getting ready

How to do it...

Superman typing – HID attacks

How to do it...

Can I charge my phone?

How to do it...

Setting up an evil access point

How to do it...

Chapter 12: Writing Reports

Introduction

Generating reports using Dradis

How to do it...

Using MagicTree

How to do it...

There's more...

Index

The users who browse this book also browse


No browse record.