Download Free Kali Linux Network Scanning Cookbook By Justin Hutchens

Introduction

The face of hacking and cyber crime has dramatically transformed over the past couple of

decades. At the end of the 20th century, many people had no idea what cyber crime was.

Those people thought that hackers were malevolent mathematical geniuses that hid in the

dimly lit basements and spoke in binary. But as of late, we have seen the rise of a whole new

brand of hackers. Because of the public availability of hacking software and tools, the hacker

of the new era could easily be your next-door neighbor, your local gas station attendant, or

even your 12-year old child. Script kiddie tools such as the Low Orbit Ion Cannon (LOIC) have

been used to launch massive Distributed Denial of Service (DDoS) attacks against large

corporations and organizations. This free Windows download merely requires that you enter

a target URL, and it also has a graphic interface that bears a striking resemblance to a space

age video game.

In a world where hacking has become so easy that a child can do it, it is absolutely essential

that organizations verify their own level of protection by having their networks tested using

the same tools that cyber criminals use against them. But, the basic usage of these tools is

not sufficient knowledge to be an effective information security professional. It is absolutely

critical that information security professionals understand the techniques that are being

employed by these tools, and why these techniques are able to exploit various vulnerabilities

in a network or system. A knowledge of the basic underlying principles that explains how these

common attack tools work enables one to effectively use them, but more importantly, it also

contributes to one’s ability to effectively identify such attacks and defend against them.

The intention of this book is to enumerate and explain the use of common attack tools that

are available in the Kali Linux platform, but more importantly, this book also aims to address

the underlying principles that define why these tools work. In addition to addressing the highly

functional tools integrated into Kali Linux, we will also create a large number of Python and

bash scripts that can be used to perform similar functions and/or to streamline existing tools.

Ultimately, the intention of this book is to help forge stronger security professionals through a

better understanding of their adversary.

Table of Contents

Chapter 1: Getting Started

Configuring a security lab with VMware Player (Windows)

Configuring a security lab with VMware Fusion (Mac OS X)

Installing Ubuntu Server

Installing Metasploitable2

Installing Windows Server

Increasing the Windows attack surface

Installing Kali Linux

Configuring and using SSH

Installing Nessus on Kali Linux

Configuring Burp Suite on Kali Linux

Using text editors (VIM and Nano)

Chapter 2: Discovery Scanning

Using Scapy to perform layer 2 discovery

Using ARPing to perform layer 2 discovery

Using Nmap to perform layer 2 discovery

Using NetDiscover to perform layer 2 discovery

Using Metasploit to perform layer 2 discovery

Using ICMP ping to perform layer 3 discovery

Using Scapy to perform layer 3 discovery

Using Nmap to perform layer 3 discovery

Using fping to perform layer 3 discovery

Using hping3 to perform layer 3 discovery

Using Scapy to perform layer 4 discovery

Using Nmap to perform layer 4 discovery

Using hping3 to perform layer 4 discovery

Chapter 3: Port Scanning

UDP port scanning

TCP port scanning

UDP scanning with Scapy

UDP scanning with Nmap

UDP scanning with Metasploit

Stealth scanning with Scapy

Stealth scanning with Nmap

Stealth scanning with Metasploit

Stealth scanning with hping3

Connect scanning with Scapy

Connect scanning with Nmap

Connect scanning with Metasploit

Connect scanning with Dmitry

TCP port scanning with Netcat

Zombie scanning with Scapy

Zombie scanning with Nmap

Chapter 4: Fingerprinting

Banner grabbing with Netcat

Banner grabbing with Python sockets

Banner grabbing with Dmitry

Banner grabbing with Nmap NSE

Banner grabbing with Amap

Service identification with Nmap

Service identification with Amap

Operating system identification with Scapy

Operating system identification with Nmap

Operating system identification with xProbe2

Passive operating system identification with p0f

SNMP analysis with Onesixtyone

SNMP analysis with SNMPwalk

Firewall identification with Scapy

Firewall identification with Nmap

Firewall identification with Metasploit

Chapter 5: Vulnerability Scanning

Vulnerability scanning with Nmap Scripting Engine

Vulnerability scanning with MSF auxiliary modules

Creating scan policies with Nessus

Vulnerability scanning with Nessus

Command-line scanning with Nessuscmd

Validating vulnerabilities with HTTP interaction

Validating vulnerabilities with ICMP interaction

Chapter 6: Denial of Service

Fuzz testing to identify buffer overflows

Remote FTP service buffer overflow DoS

Smurf DoS attack

DNS amplification DoS attack

SNMP amplification DoS attack

NTP amplification DoS attack

SYN flood DoS attack

Sock stress DoS attack

DoS attacks with Nmap NSE

DoS attacks with Metasploit

DoS attacks with the exploit database

Chapter 7: Web Application Scanning

Web application scanning with Nikto

SSL/TLS scanning with SSLScan

SSL/TLS scanning with SSLyze

Defining a web application target with Burp Suite

Using Burp Suite Spider

Using Burp Suite engagement tools

Using Burp Suite Proxy

Using the Burp Suite web application scanner

Using Burp Suite Intruder

Using Burp Suite Comparer

Using Burp Suite Repeater

Using Burp Suite Decoder

Using Burp Suite Sequencer

GET method SQL injection with sql map

POST method SQL injection with sql map

Requesting a capture SQL injection with sql map

Automating CSRF testing 399

Validating command injection vulnerabilities with HTTP traffic

Validating command injection vulnerabilities with ICMP traffic

Chapter 8: Automating Kali Tools

Nmap greppable output analysis

Nmap port scanning with targeted NSE script execution

Nmap NSE vulnerability scanning with MSF exploitation

Nessuscmd vulnerability scanning with MSF exploitation

Multithreaded MSF exploitation with reverse shell payload

Multithreaded MSF exploitation with backdoor executable

Multithreaded MSF exploitation with ICMP verification

Multithreaded MSF exploitation with admin account creation

 

Tags: #Kali Linux Cookbook full pdf 2017 #kali linux network scanning cookbook pdf #kali linux Network scanning cookbook pdf download

Download CCNA Security 210-260 Official Cert Guide By Omar Santos John Stuppi
Download CCNA Security 210-260 Official Cert Guide By Omar Santos John Stuppi
Introduction The CCNA Security Implementing Cisco Network

Leave a reply "Download Free Kali Linux Network Scanning Cookbook By Justin Hutchens"

Must read×

Top
css.php