Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniques Key Features Explore red teaming and play the hackers game to proactively defend your infrastructure Use OSINT, Google dorks, Nmap, recon-nag, and other tools for passive and active reconnaissance Learn about the latest email, Wi-Fi, and mobile-based phishing techniques Book Description Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances. This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lateral movement, privilege escalation, and command and control (C2) on compromised systems. By the end of this book, you'll have explored many advanced pentesting approaches and hacking techniques employed on networks, IoT, embedded peripheral devices, and radio frequencies. What you will learn Exploit networks using wired/wireless networks, cloud infrastructure, and web services Learn embedded peripheral device, Bluetooth, RFID, and IoT hacking techniques Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec Perform cloud security vulnerability assessment and exploitation of security misconfigurations Use bettercap and Wireshark for network sniffing Implement complex attacks with Metasploit, Burp Suite, and OWASP ZAP Who this book is for This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.

Download Now
Author
Publisher Packt Publishing Ltd
Release Date
ISBN 1801812675
Pages 572 pages
Rating 4/5 (72 users)

More Books:

Advanced Kali Linux Tools
Language: en
Pages: 108
Authors: Robert Tools
Categories:
Type: BOOK - Published: 2021-06-04 - Publisher:

GET EBOOK

!! 55% OFF for Bookstores!! NOW at 23.95 instead of 34.95 !! Buy it NOW and let your customers get addicted to this awesome book!
Mastering Kali Linux for Advanced Penetration Testing
Language: en
Pages: 572
Authors: Vijay Kumar Velu
Categories: Computers
Type: BOOK - Published: 2022-02-28 - Publisher: Packt Publishing Ltd

GET EBOOK

Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices,
Penetration Testing
Language: en
Pages: 108
Authors: Robert Tools
Categories:
Type: BOOK - Published: 2021-06-18 - Publisher:

GET EBOOK

Do you want to Defend Yourself from Hacking? Your Customers Never Stop to Use this Complete Guide! Are you fascinated by the idea of Hacking? Do you want to lea
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Language: en
Pages: 510
Authors: Vijay Kumar Velu
Categories: Computer networks
Type: BOOK - Published: 2017-06-30 - Publisher:

GET EBOOK

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.About This Book* Employ advanced p
Einstieg in Kali Linux
Language: de
Pages: 376
Authors: Jürgen Ebner
Categories: Electronic books
Type: BOOK - Published: 2020 - Publisher:

GET EBOOK

Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools Detaillierter Ablauf von Security Assessments und Durchführung von Penet
Kali Linux Revealed
Language: en
Pages: 342
Authors: Raphaël Hertzog
Categories: Hackers
Type: BOOK - Published: 2017-06-05 - Publisher:

GET EBOOK

Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice, and a truly indus
Mastering Kali Linux for Advanced Penetration Testing, Third Edition
Language: en
Pages: 548
Authors: Vijay Kumar Velu
Categories: Computers
Type: BOOK - Published: 2019-01-30 - Publisher: Packt Publishing

GET EBOOK

A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentestin
The Ultimate Kali Linux Book
Language: en
Pages: 742
Authors: Glen D. Singh
Categories: Computers
Type: BOOK - Published: 2022-02-24 - Publisher: Packt Publishing Ltd

GET EBOOK

Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch Key Features Learn to compromise enterprise networks with Ka
ICT Systems Security and Privacy Protection
Language: en
Pages: 448
Authors: Audun Jøsang
Categories: Computers
Type: BOOK - Published: 2021-06-17 - Publisher: Springer Nature

GET EBOOK

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in
16th International Conference on Cyber Warfare and Security
Language: en
Pages:
Authors: Dr Juan Lopez Jr
Categories: History
Type: BOOK - Published: 2021-02-25 - Publisher: Academic Conferences Limited

GET EBOOK

These proceedings represent the work of contributors to the 16th International Conference on Cyber Warfare and Security (ICCWS 2021), hosted by joint collaborat