Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
Chapter 1. Introduction
Information in This Chapter
Book Overview and Key Learning Points
Book Audience
Diagrams, Figures, and Screen Captures
Welcome
Penetration Testing Lifecycle
Terms
Kali History
References
Chapter 2. Download and Install Kali Linux
Information in This Chapter
Chapter Overview and Key Learning Points
Kali Linux
System Information
Downloading Kali
Hard Drive Installation
Thumb Drive Installation
SD Card Installation
Summary
Chapter 3. Software, Patches, and Upgrades
Information in This Chapter
Chapter Overview and Key Learning Points
APT Package Handling Utility
Debian Package Manager
Tarballs
A Practical Guide to Installing Nessus
Conclusion
Chapter 4. Configuring Kali Linux
Information in This Chapter
Chapter Overview and Key Learning Points
About This Chapter
The Basics of Networking
Using the Graphical User Interface to Configure Network Interfaces
Using the Command Line to Configure Network Interfaces
Using the GUI to Configure Wireless Cards
Web Server
FTP Server
SSH Server
Configure and Access External Media
Updating Kali
Upgrading Kali
Adding a Repository Source
Summary
Chapter 5. Building a Penetration Testing Lab
Information in This Chapter
Chapter Overview and Key Learning Points
Before Reading This Chapter: Build a Lab
Building a Lab on a Dime
Metasploitable2
Extending Your Lab
The Magical Code Injection Rainbow
Chapter 6. Introduction to the Penetration Test Lifecycle
Information in This Chapter
Chapter Overview And Key Learning Points
Introduction to the Lifecycle
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Exploitation
Phase 4: Maintaining Access
Phase 5: Reporting
Summary
Chapter 7. Reconnaissance
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
Start with the Targets Own Website
Website Mirroring
Google Searches
Google Hacking
Social Media
Job Sites
DNS and DNS Attacks
Query a Name Server
Zone Transfer
Reference
Chapter 8. Scanning
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction to Scanning
Understanding Network Traffic
NMAP the King of Scanners
Selecting Ports
HPING3
Nessus
Summary
Chapter 9. Exploitation
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
An Overview of Metasploit
Accessing Metasploit
Web Server and Web Application Exploitation
Conclusion
Chapter 10. Maintaining Access
Information in This Chapter
Chapter Overview and Key Learning Points
Introduction
Terminology and Core Concepts
Backdoors
Keyloggers
Summary
Reference
Chapter 11. Reports and Templates
Information in This Chapter
Chapter Overview and Key Learning Points
Reporting
Presentation
Report and Evidence Storage
Summary
Appendix A. Tribal Chicken
Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5
Materials List
Install and Configure Ubuntu
Install Kali Linux 1.0.5
Customize the Interface
Running Updates
Building an ISO using Tribal Chicken
Burning an ISO to a DVD or Blu-Ray Disc
Testing and Validation (Short Version)
Appendix B. Kali Penetration Testing Tools
Index
← Prev
Back
Next →
← Prev
Back
Next →