Kali Linux – Assuring Security by Penetration Testing: Master the art of penetration testing with Kali Linux
Download
Introduction
Kali Linux is a penetration testing and security auditing platform with advanced
tools to identify, detect, and exploit any vulnerabilities uncovered in the target
network environment. Applying an appropriate testing methodology equipped with
well-defined business objectives and a scheduled test plan will result in the robust
penetration testing of your network.
Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured
book that provides guidance on developing practical penetration testing skills by
demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step
strategy. It offers all the essential lab preparation and testing procedures to reflect realworld
attack scenarios from your business perspective in today's digital age.
This book reveals the industry's best approach for logical and systematic
penetration testing process.
This book starts with lab preparation and testing procedures, explaining the basic
installation and configuration setup, discussing different types of penetration
testing, uncovering open security testing methodologies, and proposing the Kali
Linux specific testing process. We shall discuss a number of security assessment
tools necessary to conduct penetration testing in their respective categories (target
scoping, information gathering, discovery, enumeration, vulnerability mapping,
social engineering, exploitation, privilege escalation, maintaining access, and
reporting), following the formal testing methodology. Each of these tools is
illustrated with real-world examples to highlight their practical usage and proven
configuration techniques. We have also provided extra weaponry treasures and key
resources that may be crucial to any professional penetration testers.
This book will serve as a single professional, practical, and expert guide to develop
necessary penetration testing skills from scratch. You will be trained to make the best
use of Kali Linux either in a real-world environment or in an experimental test bed.
What this book covers
Chapter 1, Beginning with Kali Linux, introduces you to Kali Linux, a Live DVD Linux
distribution specially developed to help in the penetration testing process. You will
learn a brief history of Kali Linux and several categories of tools that Kali Linux has.
Next, you will also learn how to get, use, configure, and update Kali Linux as well
as how to configure several important network services (HTTP, MySQL, and SSH)
in Kali Linux. You will also learn how to install and configure a vulnerable virtual
machine image for your testing environment and several ways that can be used to
install additional tools in Kali Linux.
Chapter 2, Penetration Testing Methodology, discusses the basic concepts, rules,
practices, methods, and procedures that constitute a defined process for a
penetration testing program. You will learn about making a clear distinction
between two well-known types of penetration testing, black box and white box.
The differences between vulnerability assessment and penetration testing will also
be analyzed. You will also learn about several security testing methodologies and
their core business functions, features, and benefits. These include OSSTMM, ISSAF,
OWASP, and WASC-TC. Thereafter, you will learn about a general penetration
Kali Linux testing process incorporated with 10 consecutive steps to conduct a
penetration testing assignment from an ethical standpoint.
Chapter 3, Target Scoping, covers a scope process to provide necessary guidelines on
normalizing the test requirements. A scope process will introduce and describe each
factor that builds a practical roadmap towards test execution. This process integrates
several key elements, such as gathering client requirements, preparing a test plan,
profiling test boundaries, defining business objectives, and project management and
scheduling. You will learn to acquire and manage the information about the target's
test environment.
Chapter 4, Information Gathering, introduces you to the information gathering phase.
You will learn how to use public resources to collect information about the target
environment. Next, you learn how to analyze DNS information and collect network
routing information. Finally, you will learn how to utilize search engines to get
information of the target domain, e-mail addresses, and document metadata from
the target environment.
Chapter 5, Target Discovery, introduces you to the target discovery process. You will
learn the purpose of target discovery and the tools that can be used to identify target
machines. At the end of this chapter, you will also learn about the tools that can be
used to perform OS fingerprinting on the target machines.
Chapter 6, Enumerating Target, introduces you to target enumeration and its purpose.
You will learn a brief theory on port scanning and several tools that can be used to
do port scanning. You will also learn about various options available to be used by
the Nmap port scanner tool. Also, you will learn about how to find SMB, SNMP, and
VPN available in the target machine in the last part of the chapter.
Chapter 7, Vulnerability Mapping, discusses two generic types of vulnerabilities: local
and remote. You will get insights on vulnerability taxonomy, pointing to industry
standards that can be used to classify any vulnerability according to its unifying
commonality pattern. Additionally, you will learn a number of security tools that
can assist you in finding and analyzing the security vulnerabilities present in a
target environment. These include OpenVAS, Cisco, Fuzzing, SMB, SNMP, and web
application analysis tools.
Chapter 8, Social Engineering, covers some core principles and practices adopted
by professional social engineers to manipulate humans into divulging information
or performing an act. You will learn some of the basic psychological principles that
formulate the goals and vision of a social engineer. You will also learn about the
attack process and methods of social engineering followed by real-world examples.
In the end, you will be given hands-on exercise using the social engineering tools
that can assist you in evaluating the target's human infrastructure.
Chapter 9, Target Exploitation, highlights the practices and tools that can be used
to conduct a real-world exploitation. The chapter will explain what areas of
vulnerability research are crucial in order to understand, examine, and test the
vulnerability. Additionally, it will also point out several exploit repositories that
should keep you informed about the publicly available exploits and when to use
them. You will also learn to use one of the infamous exploitation toolkits from a
target evaluation perspective. Moreover, you will discover the steps for writing a
simple exploit module for the Metasploit framework.
Chapter 10, Privilege Escalation, introduces you to privilege escalation as well as
network sniffing and spoofing. You will learn how to escalate your gained privilege
using a local exploit. You will also learn the tools required to attack a password via
the offline or online technique. You will also learn about several tools that can be
used to spoof the network traffic. In the last part of this chapter, you will discover
several tools that can be used to do a network sniffing attack.
Chapter 11, Maintaining Access, introduces you to the operating system and web
backdoors. You will learn about several backdoors that are available and how to use
them. You will also learn about several network tunneling tools that can be used to
create covert communication between the attacker and the victim machine.
Chapter 12, Documentation and Reporting, covers the penetration testing directives
for documentation, report preparation, and presentation. These directives draw a
systematic, structured, and consistent way to develop the test report. Furthermore,
you will learn about the process of results verification, types of reports, presentation
guidelines, and the post-testing procedures.
Appendix A, Supplementary Tools, describes several additional tools that can be used
for the penetration testing job.
Appendix B, Key Resources, explains various key resources to help you become more
skillful in the penetration testing field..
What you need for this book
All the necessary requirements for the installation, configuration, and use of Kali
Linux have been discussed in Chapter 1, Beginning with Kali Linux.
Who this book is for
If you are an IT security professional or a network administrator who has a basic
knowledge of Unix/Linux operating systems, including an awareness of information
security factors, and you want to use Kali Linux for penetration testing, this book is
for you
Home Operating System Kali Linux – Assuring Security by Penetration Testing