万本电子书0元读

万本电子书0元读

顶部广告

Web Penetration Testing with Kali Linux电子书

售       价:¥

7人正在读 | 0人评论 9.8

作       者:Joseph Muniz

出  版  社:Packt Publishing

出版时间:2013-09-25

字       数:313.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user."Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.
目录展开

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

Chapter 1. Penetration Testing and Setup

Note

Web application Penetration Testing concepts

Penetration Testing methodology

Note

Calculating risk

Kali Penetration Testing concepts

Step 1 – Reconnaissance

Step 2 – Target evaluation

Step 3 – Exploitation

Step 4 – Privilege Escalation

Step 5 – maintaining a foothold

Introducing Kali Linux

Kali system setup

Running Kali Linux from external media

Installing Kali Linux

Kali Linux and VM image first run

Kali toolset overview

Note

Summary

Chapter 2. Reconnaissance

Reconnaissance objectives

Initial research

Company website

Web history sources

Regional Internet Registries (RIRs)

Electronic Data Gathering, Analysis, and Retrieval (EDGAR)

Social media resources

Trust

Job postings

Location

Shodan

Google hacking

Google Hacking Database

Researching networks

Tip

HTTrack – clone a website

Note

ICMP Reconnaissance techniques

Note

DNS Reconnaissance techniques

DNS target identification

Maltego – Information Gathering graphs

Nmap

FOCA – website metadata Reconnaissance

Tip

Summary

Chapter 3. Server-side Attacks

Vulnerability assessment

Webshag

Note

Skipfish

Note

Note

ProxyStrike

Vega

Owasp-Zap

Note

Websploit

Exploitation

Metasploit

Note

Note

w3af

Exploiting e-mail systems

Brute-force attacks

Hydra

DirBuster

Note

WebSlayer

Note

Cracking passwords

John the Ripper

Note

Man-in-the-middle

SSL strip

Starting the attack – redirection

Setting up port redirection using Iptables

Note

Note

Summary

Chapter 4. Client-side Attacks

Social engineering

Social Engineering Toolkit (SET)

Using SET to clone and attack

Note

Note

MitM Proxy

Note

Host scanning

Host scanning with Nessus

Installing Nessus on Kali

Note

Using Nessus

Note

Obtaining and cracking user passwords

Windows passwords

Note

Mounting Windows

Note

Linux passwords

Kali password cracking tools

Note

Johnny

Note

Note

hashcat and oclHashcat

samdump2

chntpw

Ophcrack

Crunch

Other tools available in Kali

Hash-identifier

dictstat

RainbowCrack (rcracki_mt)

findmyhash

phrasendrescher

CmosPwd

creddump

Summary

Chapter 5. Attacking Authentication

Attacking session management

Clickjacking

Note

Hijacking web session cookies

Note

Web session tools

Firefox plugins

Note

Firesheep – Firefox plugin

Note

Web Developer – Firefox plugin

Greasemonkey – Firefox plugin

Cookie Injector – Firefox plugin

Note

Cookies Manager+ – Firefox plugin

Cookie Cadger

Note

Wireshark

Note

Note

Hamster and Ferret

Man-in-the-middle attack

Note

dsniff and arpspoof

Ettercap

Driftnet

Note

SQL Injection

sqlmap

Cross-site scripting (XSS)

Testing cross-site scripting

XSS cookie stealing / Authentication hijacking

Note

Note

Other tools

urlsnarf

acccheck

hexinject

Patator

DBPwAudit

Summary

Chapter 6. Web Attacks

Browser Exploitation Framework – BeEF

FoxyProxy – Firefox plugin

BURP Proxy

Note

OWASP – ZAP

Note

SET password harvesting

Tip

Tip

Fimap

Denial of Services (DoS)

Note

Note

Tip

THC-SSL-DOS

Note

Scapy

Slowloris

Note

Low Orbit Ion Cannon

Other tools

DNSCHEF

SniffJoke

Siege

Inundator

TCPReplay

Summary

Chapter 7. Defensive Countermeasures

Testing your defenses

Baseline security

Tip

STIG

Tip

Patch management

Password policies

Note

Note

Tip

Mirror your environment

HTTrack

Tip

Other cloning tools

Man-in-the-middle defense

Tip

SSL strip defense

Denial of Service defense

Cookie defense

Tip

Clickjacking defense

Tip

Digital forensics

Kali Forensics Boot

Filesystem analysis with Kali

dc3dd

Tip

Other forensics tools in Kali

chkrootkit

Autopsy

Binwalk

pdf-parser

Foremost

Pasco

Note

Scalpel

bulk_extractor

Summary

Chapter 8. Penetration Test Executive Report

Compliance

Industry standards

Professional services

Note

Documentation

Note

Report format

Cover page

Confidentiality statement

Document control

Timeline

Executive summary

Methodology

Detailed testing procedures

Summary of findings

Note

Vulnerabilities

Network considerations and recommendations

Note

Appendices

Glossary

Statement of Work (SOW)

External Penetration Testing

Additional SOW material

Note

Kali reporting tools

Dradis

KeepNote

Maltego CaseFile

MagicTree

CutyCapt

Sample reports

Note

Summary

Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

Credits

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Note

Tip

Reader feedback

Customer support

Errata

Piracy

Questions

Table of Contents

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部