Kali Linux Intrusion and Exploitation Cookbook

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments

Kali Linux Intrusion and Exploitation Cookbook

This ebook is included in a Mapt subscription
Ishan Girdhar, Dhruv Shah

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments
$10.00
$44.99
RRP $35.99
RRP $44.99
eBook
Print + eBook
Access every Packt eBook & Video for just $100
 
  • 4,000+ eBooks & Videos
  • 40+ New titles a month
  • 1 Free eBook/Video to keep every month
Find Out More
 
Code Files
Preview in Mapt

Book Details

ISBN 139781783982165
Paperback512 pages

Book Description

With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to ensure their infrastructure is secure by finding out known vulnerabilities and safeguarding their infrastructure against unknown vulnerabilities.

This practical cookbook-style guide contains chapters carefully structured in three phases – information gathering, vulnerability assessment, and penetration testing for the web, and wired and wireless networks. It's an ideal reference guide if you’re looking for a solution to a specific problem or learning how to use a tool. We provide hands-on examples of powerful tools/scripts designed for exploitation.

In the final section, we cover various tools you can use during testing, and we help you create in-depth reports to impress management. We provide system engineers with steps to reproduce issues and fix them.

Table of Contents

Chapter 1: Getting Started - Setting Up an Environment
Introduction
Installing Kali Linux on Cloud - Amazon AWS
Installing Kali Linux on Docker
Installing NetHunter on OnePlus One
Installing Kali Linux on a virtual machine
Customizing Kali Linux for faster package updates
Customizing Kali Linux for faster operations
Configuring remote connectivity services - HTTP, TFTP, and SSH
Configuring Nessus and Metasploit
Configuring third-party tools
Installing Docker on Kali Linux
Chapter 2: Network Information Gathering
Introduction
Discovering live servers over the network
Bypassing IDS/IPS/firewall
Discovering ports over the network
Using unicornscan for faster port scanning
Service fingerprinting
Determining the OS using nmap and xprobe2
Service enumeration
Open-source information gathering
Chapter 3: Network Vulnerability Assessment
Introduction
Using nmap for manual vulnerability assessment
Integrating nmap with Metasploit
Walkthrough of Metasploitable assessment with Metasploit
Vulnerability assessment with OpenVAS framework
Chapter 4: Network Exploitation
Introduction
Gathering information for credential cracking
Cracking FTP login using custom wordlist
Cracking SSH login using custom wordlist
Cracking HTTP logins using custom wordlist
Cracking MySql and PostgreSQL login using custom wordlist
Cracking Cisco login using custom wordlist
Exploiting vulnerable services (Unix)
Exploiting vulnerable services (Windows)
Exploiting services using exploit-db scripts
Chapter 5: Web Application Information Gathering
Introduction
Setting up API keys for recon-ng
Using recon-ng for reconnaissance
Gathering information using theharvester
Using DNS protocol for information gathering
Web application firewall detection
HTTP and DNS load balancer detection
Discovering hidden files/directories using DirBuster
CMS and plugins detection using WhatWeb and p0f
Finding SSL cipher vulnerabilities
Chapter 6: Web Application Vulnerability Assessment
Introduction
Running vulnerable web applications in Docker
Using W3af for vulnerability assessment
Using Nikto for web server assessment
Using Skipfish for vulnerability assessment
Using Burp Proxy to intercept HTTP traffic
Using Burp Intruder for customized attack automation
Using Burp Sequencer to test the session randomness
Chapter 7: Web Application Exploitation
Introduction
Using Burp for active/passive scanning
Using sqlmap to find SQL Injection on the login page
Exploiting SQL Injection on URL parameters using SQL Injection
Using Weevely for file upload vulnerability
Exploiting Shellshock using Burp
Using Metasploit to exploit Heartbleed
Using the FIMAP tool for file inclusion attacks (RFI/LFI)
Chapter 8: System and Password Exploitation
Introduction
Using local password-attack tools
Cracking password hashes
Using Social-Engineering Toolkit
Using BeEF for browser exploitation
Cracking NTLM hashes using rainbow tables
Chapter 9: Privilege Escalation and Exploitation
Introduction
Using WMIC to find privilege-escalation vulnerabilities
Sensitive-information gathering
Unquoted service-path exploitation
Service permission issues
Misconfigured software installations/insecure file permissions
Linux privilege escalation
Chapter 10: Wireless Exploitation
Introduction
Setting up a wireless network
Bypassing MAC address filtering
Sniffing network traffic
Cracking WEP encryption
Cracking WPA/WPA2 encryption
Cracking WPS
Denial-of-service attacks

What You Will Learn

  • Understand the importance of security assessments over merely setting up and managing systems/processes
  • Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities
  • Discover multiple solutions to escalate privileges on a compromised machine
  • Identify security anomalies in order to make your infrastructure secure and further strengthen it
  • Acquire the skills to prevent infrastructure and application vulnerabilities
  • Exploit vulnerabilities that require a complex setup with the help of Metasploit

Authors

Table of Contents

Chapter 1: Getting Started - Setting Up an Environment
Introduction
Installing Kali Linux on Cloud - Amazon AWS
Installing Kali Linux on Docker
Installing NetHunter on OnePlus One
Installing Kali Linux on a virtual machine
Customizing Kali Linux for faster package updates
Customizing Kali Linux for faster operations
Configuring remote connectivity services - HTTP, TFTP, and SSH
Configuring Nessus and Metasploit
Configuring third-party tools
Installing Docker on Kali Linux
Chapter 2: Network Information Gathering
Introduction
Discovering live servers over the network
Bypassing IDS/IPS/firewall
Discovering ports over the network
Using unicornscan for faster port scanning
Service fingerprinting
Determining the OS using nmap and xprobe2
Service enumeration
Open-source information gathering
Chapter 3: Network Vulnerability Assessment
Introduction
Using nmap for manual vulnerability assessment
Integrating nmap with Metasploit
Walkthrough of Metasploitable assessment with Metasploit
Vulnerability assessment with OpenVAS framework
Chapter 4: Network Exploitation
Introduction
Gathering information for credential cracking
Cracking FTP login using custom wordlist
Cracking SSH login using custom wordlist
Cracking HTTP logins using custom wordlist
Cracking MySql and PostgreSQL login using custom wordlist
Cracking Cisco login using custom wordlist
Exploiting vulnerable services (Unix)
Exploiting vulnerable services (Windows)
Exploiting services using exploit-db scripts
Chapter 5: Web Application Information Gathering
Introduction
Setting up API keys for recon-ng
Using recon-ng for reconnaissance
Gathering information using theharvester
Using DNS protocol for information gathering
Web application firewall detection
HTTP and DNS load balancer detection
Discovering hidden files/directories using DirBuster
CMS and plugins detection using WhatWeb and p0f
Finding SSL cipher vulnerabilities
Chapter 6: Web Application Vulnerability Assessment
Introduction
Running vulnerable web applications in Docker
Using W3af for vulnerability assessment
Using Nikto for web server assessment
Using Skipfish for vulnerability assessment
Using Burp Proxy to intercept HTTP traffic
Using Burp Intruder for customized attack automation
Using Burp Sequencer to test the session randomness
Chapter 7: Web Application Exploitation
Introduction
Using Burp for active/passive scanning
Using sqlmap to find SQL Injection on the login page
Exploiting SQL Injection on URL parameters using SQL Injection
Using Weevely for file upload vulnerability
Exploiting Shellshock using Burp
Using Metasploit to exploit Heartbleed
Using the FIMAP tool for file inclusion attacks (RFI/LFI)
Chapter 8: System and Password Exploitation
Introduction
Using local password-attack tools
Cracking password hashes
Using Social-Engineering Toolkit
Using BeEF for browser exploitation
Cracking NTLM hashes using rainbow tables
Chapter 9: Privilege Escalation and Exploitation
Introduction
Using WMIC to find privilege-escalation vulnerabilities
Sensitive-information gathering
Unquoted service-path exploitation
Service permission issues
Misconfigured software installations/insecure file permissions
Linux privilege escalation
Chapter 10: Wireless Exploitation
Introduction
Setting up a wireless network
Bypassing MAC address filtering
Sniffing network traffic
Cracking WEP encryption
Cracking WPA/WPA2 encryption
Cracking WPS
Denial-of-service attacks

Book Details

ISBN 139781783982165
Paperback512 pages
Read More

Read More Reviews