Kali Linux Hacking
A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts.
By: Ethem Mining
Copyright 2019 All rights reserved.
No part of this publication may be reproduced, duplicated or transmitted in any form or by any means, electronic, mechanical, scanning, photocopying, recording or otherwise without prior written permission from the publisher. All rights reserved.
The information provided herein is stated to be truthful and consistent in that any liability, regarding inattention or otherwise, by any usage or abuse of any policies, processes or directions contained within is the solitary and complete responsibility of the recipient reader. Under no circumstances will any legal liability or blame be held against the publisher for any reparation, damages or monetary loss due to the information herein, either directly or indirectly.
Legal Notice.
This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, quote, use or paraphrase any part of the content within this book without the consent of the author or copyright owner. Legal action will be pursued if this is breached.
Disclaimer Notice.
Please note the information contained within this document is for educational and entertainment purposes only. This book not intended to be a substitute for medical advice. Please consult your health care provider for medical advice and treatment.
Table of Contents
Introduction
Have you ever been in a situation where you wanted to try hacking something? Maybe you wanted to test the security of something that you were developing or you simply wanted to challenge yourself, and you were unsure of where to start. If this is something you have considered, Kali Linux may be the OS you need to begin the process.
It is important to note that Kali Linux is not for everyoneyou need some level of familiarity with how Linux works or at least an idea of how to interact with Linux if you wish to use Kali Linux in a useful manner. If you do not have this familiarity, it may be in your best interest to go back and begin the study of a simpler distribution of Linux, such as Ubuntu or Mint before beginning to tinker with Kali Linux. If you do decide to move forward with Kali Linux, keep in mind that the tools within this distribution can cause serious damage if misused, and could potentially even lead to significant consequences. This is not a distribution to be taken lightly.
If you decide to proceed, this book will give you the beginners guide to Kali Linux and how to use it to begin hacking. The first half of the book is dedicated to giving you the basic knowledge that will be needed to truly get the most of the You will be given information about hacking and how it has made cybersecurity more important than ever. You will learn the basics of networking itself, diving into several different concepts and how they work. You will learn all about Kali Linuxwhat it is, how it is installed, and how to use it, and you will learn several of the most basic Linux commands.
In the second half of this book, you will begin to discuss the utilization of Kali Linux for several different purposes. You will learn about Nmap and how it can be used to detect and exploit vulnerabilities. You will be guided through the steps of remaining anonymous. You will dive into Metasploit and how to make use of it with Kali Linux. You will learn about digital certificates and how to use them, and finally, you will learn about bash (Bourne Again SHell) and Python scripting and why the two of them are sometimes considered to be at odds despite the fact that they could very well work together and cooperate to get much better results than if they continue to be left separately.
By the time you have finished reading this book, you will have an idea of the foundational information you will need to first decide whether Kali Linux is for you, and if it is, you will know how to get started with it and have an understanding of just how powerful this distribution of Linux is. While Kali Linux is not for everyone, if you do happen to fall into the category of people that would find use in this program, then the tools that will be provided with this distribution are incredibly valuable assets that you will not want to miss out on having in your arsenal.
At the end of the day, you will be able to determine if you are happy with the idea of Kali Linux and whether this is for you or if instead, you should be making it a point to move on to a different distribution of Linux instead. You will be able to decide if you want to continue to work entirely with the shell or if you want to learn Python instead. And, if none of this that has been discussed makes any sense, then by reaching the end of the book, you should find some clarity with the topics at hand and how they should be used.
Part I
Introduction to Kali Linux and Hacking
Chapter 1: Introduction to Hacking
It is one of the worst things that could happen to many peoplethey log into their bank account or credit card only to realize that their account balance is completely drained or that someone has been making heavy use of their credit card. This can absolutely devastate many people, and unfortunately, these days, this is a very real concern.
These days, financial information is backed up somewhere. Your bank has a record of your account number, your card numbers, and everything else someone would need to access it. You likely log in somewhere to pay credit card or utility bills.
You may even do the bulk of your shopping, both for groceries and other times online. This means that your personal information is constantly being used online. You enter your social security number to apply for a credit card. The three major credit bureaus keep your information, tracking and regularly updating it. You may even apply for taxes online. This has one serious implicationall of your essential information is available online somewhere.
To be fair, this information is usually stored behind all sorts of safety protocols that are put into place. They are meant to protect your information from being leaked to people who may be interested in using your information for nefarious purposes, but just like armor, there is usually some way to get through it. Some systems may be safer than others but at the end of the day, a dedicated individual would be able to find some way to break through if they put in the effort.
As soon as they break through that security system, they have access to any and all of that data, which can then be released and sold, ultimately leading to you having your identity stolen. Everyone wants to avoid that unfortunate outcome, but with the storage of valuable information comes the risk of attack and exploitation, which must be accounted for.
What is Hacking?
Hacking, then, is the act of identifying any sort of weaknesses within a computer or networks security system and then exploiting that weakness in order to gain the necessary access to whatever is hidden behind the firewall.
For example, a common example is the usage of an algorithm designed to identify a password in order to sort of digitally pick the lock of a network or account. That account has then been exploited to get the desired access.
Hacking may not always be done with the intention to harmsome people do so for legitimate means, such as to locate a flaw in the system to repair it. Others may choose to do so in order to entertain themselves, not unlike doing a complicated puzzle or trying to solve increasingly complicated math problems to test and hone abilities. Others still do so in order to steal information for some purpose, whether to use it for financial gain or to cripple the system that they are hacking.