Hands-On Penetration Testing with Kali NetHunter :: Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distributi...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing Ltd,
2019.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment. |
Beschreibung: | Full Open/TCP connect scans |
Beschreibung: | 1 online resource (289 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 1788996682 9781788996686 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1089595945 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 190309s2019 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d CHVBK |d OCLCO |d MERUC |d OCLCF |d OCLCQ |d VT2 |d OCLCQ |d N$T |d NLW |d OCLCO |d UKMGB |d OCLCQ |d OCLCO |d TMA |d OCLCQ | ||
015 | |a GBC216909 |2 bnb | ||
016 | 7 | |a 019299039 |2 Uk | |
020 | |a 1788996682 | ||
020 | |a 9781788996686 |q (electronic bk.) | ||
020 | |z 9781788995177 |q print | ||
035 | |a (OCoLC)1089595945 | ||
037 | |a 9781788996686 |b Packt Publishing | ||
050 | 4 | |a QA76.9.A25 |b .S564 2019 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Singh, Glen D. | |
245 | 1 | 0 | |a Hands-On Penetration Testing with Kali NetHunter : |b Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
260 | |a Birmingham : |b Packt Publishing Ltd, |c 2019. | ||
300 | |a 1 online resource (289 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel | |
505 | 8 | |a The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team | |
505 | 8 | |a Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering | |
505 | 8 | |a Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng | |
505 | 8 | |a Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning | |
500 | |a Full Open/TCP connect scans | ||
520 | |a Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment. | ||
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computer networking & communications. |2 bicssc | |
650 | 7 | |a Operating systems. |2 bicssc | |
650 | 7 | |a Computers |x Networking |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Operating Systems |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
700 | 1 | |a Oriyano, Sean-Philip. | |
776 | 0 | 8 | |i Print version: |a Singh, Glen D. |t Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |d Birmingham : Packt Publishing Ltd, ©2019 |z 9781788995177 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL5721786 | ||
938 | |a EBSCOhost |b EBSC |n 2037546 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1089595945 |
---|---|
_version_ | 1816882486886531072 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. |
author2 | Oriyano, Sean-Philip |
author2_role | |
author2_variant | s p o spo |
author_facet | Singh, Glen D. Oriyano, Sean-Philip |
author_role | |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 .S564 2019 |
callnumber-search | QA76.9.A25 .S564 2019 |
callnumber-sort | QA 276.9 A25 S564 42019 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning |
ctrlnum | (OCoLC)1089595945 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05930cam a2200649Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1089595945</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">190309s2019 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">CHVBK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC216909</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019299039</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788996682</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788996686</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781788995177</subfield><subfield code="q">print</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1089595945</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781788996686</subfield><subfield code="b">Packt Publishing</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.S564 2019</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-On Penetration Testing with Kali NetHunter :</subfield><subfield code="b">Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing Ltd,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (289 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Full Open/TCP connect scans</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networking & communications.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Singh, Glen D.</subfield><subfield code="t">Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go.</subfield><subfield code="d">Birmingham : Packt Publishing Ltd, ©2019</subfield><subfield code="z">9781788995177</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5721786</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2037546</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1089595945 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:23Z |
institution | BVB |
isbn | 1788996682 9781788996686 |
language | English |
oclc_num | 1089595945 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (289 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing Ltd, |
record_format | marc |
spelling | Singh, Glen D. Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. Birmingham : Packt Publishing Ltd, 2019. 1 online resource (289 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning Full Open/TCP connect scans Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment. Includes bibliographical references. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Computer security. bicssc Computer networking & communications. bicssc Operating systems. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Operating Systems General. bisacsh Computer security fast Computers Access control fast Oriyano, Sean-Philip. Print version: Singh, Glen D. Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. Birmingham : Packt Publishing Ltd, ©2019 9781788995177 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546 Volltext |
spellingShingle | Singh, Glen D. Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Exploring Kali NetHunter; Chapter 1: Introduction to Kali NetHunter; What is Kali NetHunter?; Tools within Kali NetHunter; MAC Changer; The MITM framework; HID attacks; DuckHunter HID; BadUSB MITM attacks; The MANA Wireless Toolkit; Software defined radio; Network Mapper; The Metasploit Payload Generator; Searchsploit; The Android platform and security model; The Android architecture; The Application layer; The Application Framework Layer; Android Libraries; Android Runtime; Kernel The Android security modelAndroid Device Manager; SafetyNet; Verify applications; Application services; Android updates; The Google Play Store; Google Play Protect; Installing NetHunter; Building Kali NetHunter for a specific device (optional); Additional optional hardware; Summary; Chapter 2: Understanding the Phases of the Pentesting Process; The need for penetration testing; Types of hackers; White hat; Grey hat; Black hat; Script kiddie; Suicide hacker; Hacktivist; State-sponsored hacker; Penetration testing; Blue teaming vs red teaming vs purple team; Blue team; Red team; Purple team Types of penetration testsPhases of penetration testing; The pre-attack phase; The attack phase; The post-attack phase; Penetration testing methodologies and frameworks; OWASP testing framework; PCI penetration testing guide; Penetration Testing Execution Standard; Open Source Security Testing Methodology Manual; Phases of penetration testing; Reconnaissance; Scanning; Gaining access; Maintaining access; Clearing tracks; Deliverables; Summary; Section 2: Common Pentesting Tasks and Tools; Chapter 3: Intelligence-Gathering Tools; Technical requirements; Objectives of intelligence gathering Information for the takingTypes of information available; Network information; Organizational data; Tools for gathering useful information; Using Shodan; Working with filters; Using Metagoofil; Exercise using Metagoofil to collect information; Using Nikto; Exercise -- working with Nikto; What is robots.txt?; Using Parsero; Exercise -- working with Parsero; Using wget; Exercise -- working with wget; Using HTTrack; Exercise -- using HTTrack; Google Hacking; Exercise -- what's the Right Search Engine; Location; Social networking; Using Echosec; Exercise -- working with Echosec; Working with Recon-Ng Going for technical dataUsing WHOIS; Exercise -- getting the most from WHOIS; nslookup; Reverse DNS Lookups; Looking up an NS record; Querying an MX record; Querying an SOA record; Querying another DNS; Using dnsenum; Exercise -- working with dnsenum; Using DNSMAP; Using traceroute; Summary; Further reading; Chapter 4: Scanning and Enumeration Tools; Technical requirements; Scanning; Conducting a scan; Troubleshooting scanning results; Determining whether a host is up or down; Exercise -- working with ping; Using Nmap; Exercise -- Performing a Ping Sweep with Nmap; Port scanning Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Computer security. bicssc Computer networking & communications. bicssc Operating systems. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Operating Systems General. bisacsh Computer security fast Computers Access control fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85029553 https://id.nlm.nih.gov/mesh/D016494 |
title | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_auth | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_exact_search | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_full | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_fullStr | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_full_unstemmed | Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
title_short | Hands-On Penetration Testing with Kali NetHunter : |
title_sort | hands on penetration testing with kali nethunter spy on and protect vulnerable ecosystems using the power of kali linux for pentesting on the go |
title_sub | Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Computer security. bicssc Computer networking & communications. bicssc Operating systems. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Operating Systems General. bisacsh Computer security fast Computers Access control fast |
topic_facet | Computer security. Computers Access control. Computer Security Sécurité informatique. Ordinateurs Accès Contrôle. Computer networking & communications. Operating systems. Computers Networking General. Computers Security General. Computers Operating Systems General. Computer security Computers Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2037546 |
work_keys_str_mv | AT singhglend handsonpenetrationtestingwithkalinethunterspyonandprotectvulnerableecosystemsusingthepowerofkalilinuxforpentestingonthego AT oriyanoseanphilip handsonpenetrationtestingwithkalinethunterspyonandprotectvulnerableecosystemsusingthepowerofkalilinuxforpentestingonthego |