Mastering Kali Linux for advanced penetration testing :: a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /
Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Pub.,
2014.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live host discovery; Port, operating system, and service discovery; Port scanning; Fingerprinting the operating system; Determining active services; Employing comprehensive reconnaissance applications; nmap; The recon-ng framework; Maltego; Vulnerability scanning; Summary; Chapter 4: Exploit This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781782163138 1782163131 1782163123 9781782163121 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn883661832 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140715s2014 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d E7B |d N$T |d DEBBG |d DEBSZ |d COO |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d K6U |d AGLDB |d OCLCQ |d COCUF |d ICA |d CNNOR |d OCLCQ |d PIFFA |d FVL |d U3W |d REB |d D6H |d STF |d OCLCQ |d VTS |d CEF |d NLE |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UKAHL |d HS0 |d INARC |d OCLCO |d QGK |d OCLCQ |d OCLCO | ||
019 | |a 1259092169 | ||
020 | |a 9781782163138 |q (electronic bk.) | ||
020 | |a 1782163131 |q (electronic bk.) | ||
020 | |a 1782163123 | ||
020 | |a 9781782163121 | ||
020 | |z 9781782163121 | ||
035 | |a (OCoLC)883661832 |z (OCoLC)1259092169 | ||
050 | 4 | |a QA76.9.A25 |b B444 2014 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 060000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Beggs, Robert W. | |
245 | 1 | 0 | |a Mastering Kali Linux for advanced penetration testing : |b a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |c Robert W. Beggs. |
260 | |a Birmingham, UK : |b Packt Pub., |c 2014. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed July 9, 2014). | |
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations | |
505 | 8 | |a Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists | |
505 | 8 | |a Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities | |
505 | 8 | |a Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent | |
520 | |a Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live host discovery; Port, operating system, and service discovery; Port scanning; Fingerprinting the operating system; Determining active services; Employing comprehensive reconnaissance applications; nmap; The recon-ng framework; Maltego; Vulnerability scanning; Summary; Chapter 4: Exploit | ||
520 | |a This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, | ||
526 | |a 51420028 |x Máster Universitario en Ingeniería de Telecomunicación |z Seguridad Avanzada. | ||
546 | |a English. | ||
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Internet |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
776 | 0 | 8 | |i Print version: |a Beggs, Robert W. |t Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. |d Birmingham, [England] : Packt Publishing, ©2014 |h v, 336 pages |k Community experience distilled. |z 9781782163121 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=805410 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26843700 | ||
938 | |a ebrary |b EBRY |n ebr10887666 | ||
938 | |a EBSCOhost |b EBSC |n 805410 | ||
938 | |a Internet Archive |b INAR |n masteringkalilin0000begg | ||
938 | |a YBP Library Services |b YANK |n 11951075 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn883661832 |
---|---|
_version_ | 1816882278691766273 |
adam_text | |
any_adam_object | |
author | Beggs, Robert W. |
author_facet | Beggs, Robert W. |
author_role | |
author_sort | Beggs, Robert W. |
author_variant | r w b rw rwb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B444 2014 |
callnumber-search | QA76.9.A25 B444 2014 |
callnumber-sort | QA 276.9 A25 B444 42014 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent |
ctrlnum | (OCoLC)883661832 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06746cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn883661832</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140715s2014 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">E7B</subfield><subfield code="d">N$T</subfield><subfield code="d">DEBBG</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">ICA</subfield><subfield code="d">CNNOR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">PIFFA</subfield><subfield code="d">FVL</subfield><subfield code="d">U3W</subfield><subfield code="d">REB</subfield><subfield code="d">D6H</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NLE</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">HS0</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1259092169</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163138</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163131</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163123</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163121</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781782163121</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)883661832</subfield><subfield code="z">(OCoLC)1259092169</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B444 2014</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beggs, Robert W.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Kali Linux for advanced penetration testing :</subfield><subfield code="b">a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /</subfield><subfield code="c">Robert W. Beggs.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Pub.,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed July 9, 2014).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live host discovery; Port, operating system, and service discovery; Port scanning; Fingerprinting the operating system; Determining active services; Employing comprehensive reconnaissance applications; nmap; The recon-ng framework; Maltego; Vulnerability scanning; Summary; Chapter 4: Exploit</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management,</subfield></datafield><datafield tag="526" ind1=" " ind2=" "><subfield code="a">51420028</subfield><subfield code="x">Máster Universitario en Ingeniería de Telecomunicación</subfield><subfield code="z">Seguridad Avanzada.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Beggs, Robert W.</subfield><subfield code="t">Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.</subfield><subfield code="d">Birmingham, [England] : Packt Publishing, ©2014</subfield><subfield code="h">v, 336 pages</subfield><subfield code="k">Community experience distilled.</subfield><subfield code="z">9781782163121</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=805410</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26843700</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10887666</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">805410</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">masteringkalilin0000begg</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11951075</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn883661832 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:05Z |
institution | BVB |
isbn | 9781782163138 1782163131 1782163123 9781782163121 |
language | English |
oclc_num | 883661832 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Pub., |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Beggs, Robert W. Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs. Birmingham, UK : Packt Pub., 2014. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Online resource; title from cover (Safari, viewed July 9, 2014). Includes index. Print version record. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live host discovery; Port, operating system, and service discovery; Port scanning; Fingerprinting the operating system; Determining active services; Employing comprehensive reconnaissance applications; nmap; The recon-ng framework; Maltego; Vulnerability scanning; Summary; Chapter 4: Exploit This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, 51420028 Máster Universitario en Ingeniería de Telecomunicación Seguridad Avanzada. English. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh COMPUTERS Internet General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast Print version: Beggs, Robert W. Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. Birmingham, [England] : Packt Publishing, ©2014 v, 336 pages Community experience distilled. 9781782163121 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=805410 Volltext |
spellingShingle | Beggs, Robert W. Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Community experience distilled. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh COMPUTERS Internet General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |
title_auth | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |
title_exact_search | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |
title_full | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs. |
title_fullStr | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs. |
title_full_unstemmed | Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs. |
title_short | Mastering Kali Linux for advanced penetration testing : |
title_sort | mastering kali linux for advanced penetration testing a practical guide to testing your network s security with kali linux the preferred choice of penetration testers and hackers |
title_sub | a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |
topic | Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh COMPUTERS Internet General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast |
topic_facet | Penetration testing (Computer security) Computer networks Security measures. Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. COMPUTERS Internet General. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=805410 |
work_keys_str_mv | AT beggsrobertw masteringkalilinuxforadvancedpenetrationtestingapracticalguidetotestingyournetworkssecuritywithkalilinuxthepreferredchoiceofpenetrationtestersandhackers |