Basic Security Application Penetration Testing Testing with Kali Linux By Daniel Dieterle

Application Penetration Testing

Download Free Basic Security Testing with Kali Linux Pdf

Introduction: Application Penetration Testing

What is Kali?

Getting Started with application penetration testing, Kali is the latest and greatest version of the ever-popular Backtrack Linux application penetration testing distribution. The creators of the Backtrack series kept Kali in a format very similar to Backtrack, so anyone familiar with the older Backtrack platform will feel right at home.
Kali has been revamped from the ground up to be the best and most feature-rich Ethical Hacking/Application penetration testing distribution available. Kali also runs on more hardware devices greatly increasing your options for computer security penetration testing or “pentesting” systems.

If you are coming to Kali from a Backtrack background, after a short familiarization period you should find that everything is very similar and your comfort level should grow very quickly. If you are new to Kali, once you get used to it, you will find an easy to use security testing platform that includes hundreds of useful and powerful tools to test and help secure your network systems.

Why Use Kali?

Kali includes over 300 security testing tools. A lot of the redundant tools from Backtrack have been removed and the tool interface streamlined. You can now get to the most used tools quickly as they appear in a top ten security tool menu. You can also find these same tools and a plethora of others all neatly categorized in the menu system.

Basic Security Application Penetration Testing with Kali Linux Pdf Chapters And Sections

Table Of Contents For Application Penetration Testing

Chapter 1 – Introduction

What is Kali?
Why Use Kali?
Ethical Hacking Issues
Scope of this Book
Why did I write this book?
Disclaimer

Part 1: Installing and Basic Overview
Chapter 2 – Installing Kali with VMWare Player

Install VMWare Player & Kali
Updating Kali
Installing VMWare Tools for Linux
Installing Metasploitable 2
Windows Virtual Machines
Quick Desktop Tour

Part 2 – Metasploit Tutorial
Chapter 3 – Introduction to Metasploit

Metasploit Overview
Picking an Exploit
Setting Exploit Options
Multiple Target Types
Getting a remote shell on a Windows XP Machine
Picking a Payload
Setting Payload Options
Running the Exploit
Connecting to a Remote Session

Chapter 4 – Meterpreter Shell

Basic Meterpreter Commands
Core Commands
File System Commands
Network Commands
System Commands
Capturing Webcam Video, Screenshots and Sound
Running Scripts
Playing with Modules – Recovering Deleted Files from Remote System

Part 3 – Information Gathering & Mapping
Chapter 5 – Recon Tools

Recon-NG
Using Recon-NG
Dmitry
Netdiscover
Zenmap

Chapter 6 – Shodan

Why scan your network with Shodan?
Filter Guide
Filter Commands
Combined Searches
Shodan Searches with Metasploit

Part 3 – Attacking Hosts
Chapter 7 – Metasploitable Tutorial – Part One

Installing and Using Metasploitable
Scanning for Targets
Exploiting the Unreal IRC Service

Chapter 8 – Metasploitable – Part Two: Scanners

Using a Scanner
Using Additional Scanners
Scanning a Range of Addresses
Exploiting the Samba Service

Chapter 9 – Windows AV Bypass with Veil

Installing Veil
Using Veil
Getting a Remote Shell

Chapter 10 – Windows Privilege Escalation by Bypassing UAC

UAC Bypass

Chapter 11 – Packet Captures and Man-in-the-Middle Attacks

Creating a Man-in-the-Middle attack with Arpspoof
Viewing URL information with Urlsnarf
Viewing Captured Graphics with Driftnet
Remote Packet Capture in Metasploit
Wireshark
Xplico

Chapter 12 – Using the Browser Exploitation Framework

BeEF in Action
PART FOUR – Social Engineering

Chapter 13 – Social Engineering

Introduction
Social Engineering Defense

Chapter 14 – The Social Engineering Toolkit

Staring SET
Mass Emailer
SET ’ s Java PYInjector Attack
Social Engineering Toolkit: PowerShell Attack Vector
More Advanced Attacks with SET

Chapter 15 – Subterfuge

Automatic Browser Attack with Subterfuge
Browser Autopwn

PART FIVE – Password Attacks
Chapter 16 – Cracking Simple LM Hashes

Cracking LM passwords Online
Looking up Hashes in Kali

Chapter 17 – Pass the Hash

Passing the Hash with Psexec
Passing the Hash Toolkit
Defending against Pass the Hash Attacks

Chapter 18 – Mimikatz Plain Text Passwords

Loading the Module
Recovering Hashes and Plain Text Passwords

Chapter 19 – Mimikatz and Utilman

Utilman Login Bypass
Recovering password from a Locked Workstation

Chapter 20 – Keyscan and Lockout Keylogger

Keylogging with Meterpreter
Automating KeyScanning with Lockout Keylogger

Chapter 21 – HashCat

Cracking NTLM passwords
Cracking harder passwords
Using a Larger Dictionary File
More advanced cracking

Chapter 22 – Wordlists

Wordlists Included with Kali
Wordlist Generator
Crunch
Download Wordlists from the Web

Chapter 23 – Cracking Linux Passwords

Cracking Linux Passwords
Automating Password Attacks with Hydra

PART SIX – Router and Wi-Fi Attacks
Chapter 24 – Router Attacks

Router Passwords
Routerpwn
Wi-Fi Protected Setup (WPS)
Attacking WPS with Reaver
Attacking WPS with Fern WiFi Cracker
Cracking WPS with Wifite

Chapter 25 – Wireless Network Attacks

Wireless Security Protocols
Viewing Wireless Networks with Airmon-NG
Viewing Wi-Fi Packets and Hidden APs in Wireshark
Turning a Wireless Card into an Access Point
Using MacChanger to Change the Address (MAC) of your Wi-Fi Card

Chapter 26 – Fern WIFI Cracker

Using Fern

Chapter 27 – Wi-Fi Testing with WiFite

Using WiFite
More advanced attacks with WiFite

Chapter 28 – Kismet

Scanning with Kismet
Analyzing the Data

Chapter 29 – Easy Creds

Installing Easy-Creds
Creating a Fake AP with SSL strip Capability
Recovering passwords from secure sessions
PART SEVEN – Raspberry Pi

Chapter 30 – Installing Kali on a Raspberry Pi

Pi Power Supplies and Memory Cards
Installing Kali on a Raspberry Pi
Connecting to a “ Headless ” Pi remotely from a Windows system
Viewing Graphical X Windows Programs Remotely through Putty

Chapter 31 – WiFi Pentesting on a Raspberry Pi

Basic Wi-Fi Pentesting using a Raspberry Pi
WEP and WPA/WPA2 Cracking

Chapter 32 – Network Defense and Conclusion

Patches & Updates
Firewalls and IPS
Anti-Virus/ Network Security Programs
Limit Services & Authority Levels
Use Script Blocking Programs
Use Long Complex Passwords
Network Security Monitoring
Logging
Educate your users
Scan your Network
Learn Offensive Computer Security
Index

Download Now

Note: If you have any question about Application Penetration Testing Pdf Then you can comment it.

Related Posts:


Be the first to comment

Leave a Reply

Your email address will not be published.


*