57. Kali Linux Cookbook

    Author: Myanmar Ebook Store Genre: »
    Rating

    Preface
    Chapter 1: Up and Running with Kali Linux
    Introduction
    Installing to a hard disk drive
    Installing to a USB drive with persistent memory
    Installing in VirtualBox
    Installing VMware Tools
    Fixing the splash screen
    Starting network services
    Setting up the wireless network

    Chapter 2: Customizing Kali Linux
    Introduction
    Preparing kernel headers
    Installing Broadcom drivers
    Installing and configuring ATI video card drivers
    Installing and configuring nVidia video card drivers
    Applying updates and configuring extra security tools
    Setting up ProxyChains
    Directory encryption

    Chapter 3: Advanced Testing Lab
    Introduction
    Getting comfortable with VirtualBox
    Downloading Windows Targets
    Downloading Linux Targets
    Attacking WordPress and other applications

    Chapter 4: Information Gathering
    Introduction
    Service enumeration
    Determining network range
    Identifying active machines
    Finding open ports
    Operating system fingerprinting
    Service fingerprinting
    Threat assessment with Maltego
    Mapping the network

    Chapter 5: Vulnerability Assessment
    Introduction
    Installing, configuring, and starting Nessus
    Nessus – finding local vulnerabilities
    Nessus – finding network vulnerabilities
    Nessus – finding Linux-specific vulnerabilities
    Nessus – finding Windows-specific vulnerabilities
    Installing, configuring, and starting OpenVAS
    OpenVAS – finding local vulnerabilities
    OpenVAS – finding network vulnerabilities
    OpenVAS – finding Linux-specific vulnerabilities
    OpenVAS – finding Windows-specific vulnerabilities

    Chapter 6: Exploiting Vulnerabilities
    Introduction
    Installing and configuring Metasploitable
    Mastering Armitage, the graphical management tool for Metasploit
    Mastering the Metasploit Console (MSFCONSOLE)
    Mastering the Metasploit CLI (MSFCLI)
    Mastering Meterpreter
    Metasploitable MySQL
    Metasploitable PostgreSQL
    Metasploitable Tomcat
    Metasploitable PDF
    Implementing browser_autopwn

    Chapter 7: Escalating Privileges
    Introduction
    Using impersonation tokens
    Local privilege escalation attack
    Mastering the Social Engineering Toolkit (SET)
    Collecting the victim's data
    Cleaning up the tracks
    Creating a persistent backdoor
    Man In The Middle (MITM) attack

    Chapter 8: Password Attacks
    Introduction
    Online password attacks
    Cracking HTTP passwords
    Gaining router access
    Password profiling
    Cracking a Windows password using John the Ripper
    Using dictionary attacks
    Using rainbow tables
    Using nVidia Compute Unified Device Architecture (CUDA)
    Using ATI Stream
    Physical access attacks

    Chapter 9: Wireless Attacks
    Introduction
    Wireless network WEP cracking
    Wireless network WPA/WPA2 cracking
    Automating wireless network cracking
    Accessing clients using a fake AP
    URL traffic manipulation
    Port redirection
    Sniffing network traffic

    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll