更新时间:2021-06-24 18:19:59
coverpage
Title Page
Dedication
About Packt
Why subscribe?
Packt.com
Contributors
About the authors
About the reviewers
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Conventions used
Get in touch
Reviews
Installing and Configuring Kali Linux
Technical requirements
Kali Linux tool categories
Downloading Kali Linux
Using Kali Linux
Running Kali using a Live DVD
Installing on a hard disk
Installing Kali on a physical machine
Installing Kali on a virtual machine
Installing Kali on a virtual machine from the ISO image
Installing Kali Linux on a virtual machine using the Kali Linux VM image provided
Saving or moving the virtual machine
Installing Kali on a USB disk
Configuring the virtual machine
VirtualBox guest additions
Setting up networking
Setting up a wired connection
Setting up a wireless connection
Updating Kali Linux
Setting up Kali Linux AMI on Amazon AWS Cloud
Summary
Questions
Further reading
Setting Up Your Test Lab
Physical or virtual?
Setting up a Windows environment in a VM
Installing vulnerable servers
Setting up Metasploitable 2 in a VM
Setting up Metasploitable 3 in a VM
Installing Packer
Installing Vagrant
Pre-built Metasploit 3
Setting up BadStore in a VM
Installing additional tools in Kali Linux
Network services in Kali Linux
HTTP
MySQL
SSH
Additional labs and resources
Penetration Testing Methodology
Penetration testing methodology
OWASP testing guide
PCI penetration testing guide
Penetration Testing Execution Standard
NIST 800-115
Open Source Security Testing Methodology Manual
General penetration testing framework
Reconnaissance
Scanning and enumeration
Scanning
ARP scanning
The network mapper (Nmap)
Nmap port scanner/TCP scan
Nmap half-open/stealth scan
Nmap OS-detection
Nmap service-detection
Nmap ping sweeps
Enumeration
SMB shares
DNS zone transfer
DNSRecon
SNMP devices
Packet captures
tcpdump
Wireshark
Gaining access
Exploits
Exploits for Linux
Exploits for Windows
Escalating privileges
Maintaining access
Covering your tracks
Reporting
Footprinting and Information Gathering
Open Source Intelligence
Using public resources
Querying the domain registration information