Kali Linux 2: Windows Penetration Testing

0
(0)

Kali Linux 2: Windows Penetration Testing
 

  • Author:Bo WeaverWolf Halton
  • Length: 422 pages
  • Edition: 1
  • Publisher: Packt Publishing
  • Publication Date: 2016-06-28
  • ISBN-10: B013GKGL94
  • Sales Rank: #857977 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

    About This Book

    • Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux
    • Footprint, monitor, and audit your network and investigate any ongoing infestations
    • Customize Kali Linux with this professional guide so it becomes your pen testing toolkit

    Who This Book Is For

    If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial.

    What You Will Learn

    • Set up Kali Linux for pen testing
    • Map and enumerate your Windows network
    • Exploit several common Windows network vulnerabilities
    • Attack and defeat password schemes on Windows
    • Debug and reverse-engineer Windows programs
    • Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files
    • Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done

    In Detail

    Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS.

    This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali’s top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system’s DNS cache. Once you gain access to a machine or network, maintaining access is important.

    Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.

    Style and approach

    This book is a hands-on guide for Kali Linux pen testing. This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology. The book uses easy-to-understand yet professional language for explaining concepts.

    Table of Contents

    Chapter 1. Sharpening the Saw
    Chapter 2. Information Gathering and Vulnerability Assessment
    Chapter 3. Exploitation Tools (Pwnage)
    Chapter 4. Web Application Exploitation
    Chapter 5. Sniffing and Spoofing
    Chapter 6. Password Attacks
    Chapter 7. Windows Privilege Escalation
    Chapter 8. Maintaining Remote Access
    Chapter 9. Reverse Engineering and Stress Testing
    Chapter 10. Forensics

    中文:

    书名:Kali Linux 2: Windows Penetration Testing

    Kali Linux:一个完整的测试工具包,为工作中的黑客提供流畅的回溯

    About This Book

    • 使用Kali Linux在MS Windows上进行网络测试、监视、笔测试和取证
    • Footprint, monitor, and audit your network and investigate any ongoing infestations
    • 使用此专业指南定制Kali Linux,使其成为您的笔测试工具包

    这本书是为谁写的

    如果你是一名职业道德黑客,希望通过对Kali Linux的透彻理解来扩展攻击技能,那么这本书就是为你准备的。了解Linux操作系统和Bash终端仿真器以及Windows桌面和命令行将非常有帮助。

    What You Will Learn

    • Set up Kali Linux for pen testing
    • Map and enumerate your Windows network
    • Exploit several common Windows network vulnerabilities
    • Attack and defeat password schemes on Windows
    • Debug and reverse-engineer Windows programs
    • 恢复丢失的文件,调查成功的黑客攻击,并发现看起来无害的文件中的隐藏数据
    • 捕获并持有网络管理员权限,并在初始测试完成后维护网络后门

    In Detail

    Microsoft Windows是两个最常见的操作系统之一,管理其安全性催生了IT安全纪律。Kali Linux是测试和维护Windows安全的首选平台。Kali构建在Linux的Debian发行版上,并分享了该操作系统的传奇稳定性。这让您可以专注于使用网络渗透、密码破解、取证工具,而不是操作系统。

    这本书有最先进的工具和技术来复制老练的黑客使用的方法,使您成为Kali Linux渗透测试的专家。首先,我们将向您介绍Kali’的十大工具和其他有用的报告工具。然后,您将在目标网络中找到方法,并确定能够远程攻击系统的已知漏洞。接下来,您将证明您发现的漏洞是真实的和可利用的。您将学习在七类开发工具中使用工具。此外,您还可以使用Websploit等工具执行Web访问漏洞攻击。安全只与链条中最薄弱的一环一样强大。密码往往是这一薄弱环节。因此,您将了解可以与其他方法一起使用的密码攻击,以侵入并拥有网络。此外,您还需要面对网络嗅探和IP欺骗,前者可以帮助您了解哪些用户正在使用您可以利用的服务,后者可以用来毒害系统的DNS缓存。一旦您获得对计算机或网络的访问权限,保持访问权限就很重要。

    这样,你不仅学会了在机器上穿透,还学会了Windows权限的提升。使用易于遵循的分步说明和支持图像,您将能够快速用笔测试您的系统和网络。

    Style and approach

    这本书是Kali Linux笔测试的实践指南。本书将提供使用经过验证的黑客方法测试您的网络安全所需的所有实用知识。这本书使用了通俗易懂但又专业的语言来解释概念。

    Table of Contents

    第一章.磨利锯子
    Chapter 2. Information Gathering and Vulnerability Assessment
    Chapter 3. Exploitation Tools (Pwnage)
    Chapter 4. Web Application Exploitation
    第5章.嗅探和欺骗
    第6章:密码攻击
    Chapter 7. Windows Privilege Escalation
    Chapter 8. Maintaining Remote Access
    Chapter 9. Reverse Engineering and Stress Testing
    第十章.取证

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册