售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
Chapter 1. Penetration Testing and Setup
Note
Web application Penetration Testing concepts
Penetration Testing methodology
Note
Calculating risk
Kali Penetration Testing concepts
Step 1 – Reconnaissance
Step 2 – Target evaluation
Step 3 – Exploitation
Step 4 – Privilege Escalation
Step 5 – maintaining a foothold
Introducing Kali Linux
Kali system setup
Running Kali Linux from external media
Installing Kali Linux
Kali Linux and VM image first run
Kali toolset overview
Note
Summary
Chapter 2. Reconnaissance
Reconnaissance objectives
Initial research
Company website
Web history sources
Regional Internet Registries (RIRs)
Electronic Data Gathering, Analysis, and Retrieval (EDGAR)
Social media resources
Trust
Job postings
Location
Shodan
Google hacking
Google Hacking Database
Researching networks
Tip
HTTrack – clone a website
Note
ICMP Reconnaissance techniques
Note
DNS Reconnaissance techniques
DNS target identification
Maltego – Information Gathering graphs
Nmap
FOCA – website metadata Reconnaissance
Tip
Summary
Chapter 3. Server-side Attacks
Vulnerability assessment
Webshag
Note
Skipfish
Note
Note
ProxyStrike
Vega
Owasp-Zap
Note
Websploit
Exploitation
Metasploit
Note
Note
w3af
Exploiting e-mail systems
Brute-force attacks
Hydra
DirBuster
Note
WebSlayer
Note
Cracking passwords
John the Ripper
Note
Man-in-the-middle
SSL strip
Starting the attack – redirection
Setting up port redirection using Iptables
Note
Note
Summary
Chapter 4. Client-side Attacks
Social engineering
Social Engineering Toolkit (SET)
Using SET to clone and attack
Note
Note
MitM Proxy
Note
Host scanning
Host scanning with Nessus
Installing Nessus on Kali
Note
Using Nessus
Note
Obtaining and cracking user passwords
Windows passwords
Note
Mounting Windows
Note
Linux passwords
Kali password cracking tools
Note
Johnny
Note
Note
hashcat and oclHashcat
samdump2
chntpw
Ophcrack
Crunch
Other tools available in Kali
Hash-identifier
dictstat
RainbowCrack (rcracki_mt)
findmyhash
phrasendrescher
CmosPwd
creddump
Summary
Chapter 5. Attacking Authentication
Attacking session management
Clickjacking
Note
Hijacking web session cookies
Note
Web session tools
Firefox plugins
Note
Firesheep – Firefox plugin
Note
Web Developer – Firefox plugin
Greasemonkey – Firefox plugin
Cookie Injector – Firefox plugin
Note
Cookies Manager+ – Firefox plugin
Cookie Cadger
Note
Wireshark
Note
Note
Hamster and Ferret
Man-in-the-middle attack
Note
dsniff and arpspoof
Ettercap
Driftnet
Note
SQL Injection
sqlmap
Cross-site scripting (XSS)
Testing cross-site scripting
XSS cookie stealing / Authentication hijacking
Note
Note
Other tools
urlsnarf
acccheck
hexinject
Patator
DBPwAudit
Summary
Chapter 6. Web Attacks
Browser Exploitation Framework – BeEF
FoxyProxy – Firefox plugin
BURP Proxy
Note
OWASP – ZAP
Note
SET password harvesting
Tip
Tip
Fimap
Denial of Services (DoS)
Note
Note
Tip
THC-SSL-DOS
Note
Scapy
Slowloris
Note
Low Orbit Ion Cannon
Other tools
DNSCHEF
SniffJoke
Siege
Inundator
TCPReplay
Summary
Chapter 7. Defensive Countermeasures
Testing your defenses
Baseline security
Tip
STIG
Tip
Patch management
Password policies
Note
Note
Tip
Mirror your environment
HTTrack
Tip
Other cloning tools
Man-in-the-middle defense
Tip
SSL strip defense
Denial of Service defense
Cookie defense
Tip
Clickjacking defense
Tip
Digital forensics
Kali Forensics Boot
Filesystem analysis with Kali
dc3dd
Tip
Other forensics tools in Kali
chkrootkit
Autopsy
Binwalk
pdf-parser
Foremost
Pasco
Note
Scalpel
bulk_extractor
Summary
Chapter 8. Penetration Test Executive Report
Compliance
Industry standards
Professional services
Note
Documentation
Note
Report format
Cover page
Confidentiality statement
Document control
Timeline
Executive summary
Methodology
Detailed testing procedures
Summary of findings
Note
Vulnerabilities
Network considerations and recommendations
Note
Appendices
Glossary
Statement of Work (SOW)
External Penetration Testing
Additional SOW material
Note
Kali reporting tools
Dradis
KeepNote
Maltego CaseFile
MagicTree
CutyCapt
Sample reports
Note
Summary
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Note
Tip
Reader feedback
Customer support
Errata
Piracy
Questions
Table of Contents
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜