Praise for the Ultimate Hackers Guide
As a penetration tester Tye Darwin book has helped me many times for quick reference. It is handy and easy to understand. Hugely recommended
Dave
Magnificent! Easy and Simple. A best guide for beginners who are trying to master Kali Linux and Hacking procedures
Anonymous Hacker
Tye Darwin delivers a book that can be both used as a reference for experienced hackers and a bible for starters
Simon
HACKING FOR BEGINNERS
LEARN PENETRATION TESTING WITH KALI LINUX AND EXPLOIT NETWORKS, CRACK WIRELESS DEVICES & WEBSITES
GVS PUBLICATIONS
Copyright 2020 by TERMINALSEC TEAM
All rights reserved.
No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the author, except for the use of brief quotations in a book review.
Hackers are geniuses, not because they are smart, but because of they can control the whole world with a click of a button
Michael L. Georgoveanu
Contents
Introduction
This book is an ultimate bundle for beginners trying to explore the world of hacking. Hackers are often used in popular cultural references as shady people. However, people often forget the fact that hackers are a driving force for technological advancements.
When you break their applications they build them more strongly
An Anonymous Hacker
For who this book is written?
The Author of this book is a pen tester and decided to write a book for beginners who are ethically sidelined to protecting systems instead of breaking them. This book uses more simple language and cognitive study techniques to help you improve your knowledge on the subject.
This book has five modules :
- Introducing Kali Linux and Hacking
- Reconnaissance
- Scanning & Sniffing
- Metasploit
- Password Cracking
Each module describes basic concepts first and delivers you the practical knowledge to streamline your thoughts and create a coherent idea of the subject.
A bundle of tools are also used in this book. We recommend you to carefully read the guidelines of those tools before using them.
We hope that you will gain a lot of knowledge by reading this book. Let us start our journey into the wonderful world of hacking!
TYE DARWIN
Author
INTRODUCING HACKING AND KALI
AN ULTIMATE BEGINNERS GUIDE TO A PENETRATION TESTER
Chapter 1
Introduction to Penetration Testing
Hacking is a term that is usually defined to describe about gaining access to a system that is protected with security. Hackers are existing until the evolution of networks. Previously hacking is primarily used to steal military reports from other countries. As time passed on internet spread and came an opportunity for hackers to gain easy access to data and digital currency. While there are different types of hackers , the term is constantly used in popular cultural references as an evil term.
Hacking is an art. Exploitation is a skill. In 21st century when internet is filled with malicious trojans and shady websites, security of consumers is an important issue for both large and small websites. This is the reason why every multinational company deploys hundreds of penetration testers to constantly monitor and test their resources.
A lot of security experts also work as bug-bounty hunters to earn money and secure websites and applications. You can check out more about bug bounty here.
What is penetration testing?
Penetration testing is a security testing methodology and evaluation strategy to find out the security of computer network system by simulating the attack method of malicious hackers. Through the implementation of penetration testing, the potential but undisclosed security problems in a host can be found. In the immediate next step, users/developers can consolidate and improve the deficiencies and security weaknesses of the system provided by the test results to make the user's system more secure.
When ethical hackers implement penetration testing, they use three methods: black box test, white box test and gray box test. This section will introduce these three test methods respectively.
Black box testing
Black box testing is known as external testing. In this way of testing, penetration testers will evaluate the target network infrastructure from a remote network location, without any information about the internal topology of the target network. They simulate the external attackers in the network environment, and use popular attack technologies and tools to gradually infiltrate and invade the target organisation step by step, revealing known or unknown security vulnerabilities in the target network, and further evaluate whether these vulnerabilities can be exploited to gain control or operate business, resulting in asset loss.
The disadvantage of black box testing is that the test is time-consuming and laborious, and requires the penetration tester to have higher technical ability. The advantage is that this type of test is more conducive to mining the potential vulnerabilities, weak links and weak points of the system.
White box testing
White box testing is known as internal testing.The white box penetration tester before testing learns all the internal and underlying information about the target environment. This allows penetration testers to discover and verify the most serious vulnerabilities in the system at the lowest cost. The implementation process of white box testing is similar to that of black box testing, except that there is no need for target location and intelligence collection. Penetration testers can use the the normal channel and obtains all kinds of information from the tested organisation, such as network topology, employee information and even code fragments of website program, and can conduct face-to-face communication with other employees of the unit.
The disadvantage of white box testing is that it can not test the emergency response procedures of customer organisations, and can not judge the detection efficiency of their security protection plan against specific attacks. The advantage of white box testing is that it takes much less time and cost to find and solve security vulnerabilities than black box testing.
Gray box testing
Gray box test Testing is a combination of basic types of white box testing and black box testing, which can provide more in-depth and comprehensive security review of the target system. The advantage of the combination is that the advantages of the two penetration testing methods can be used at the same time. In the external penetration attack scenario using gray box testing method, penetration testers need to penetrate the target network from the outside. However, the underlying topology and architecture of the target network will help to better select attack paths and methods to achieve better penetration test results.
Penetration testing process
After the user gets a clear understanding of the concept of penetration testing, they can begin to penetrate a target. Before implementing the penetration test in detail, we will first introduce its workflow. There are 5 stages in total, namely, preliminary interaction, information collection, vulnerability scanning, vulnerability exploitation and report writing. In order to facilitate users to have a clearer understanding of the information obtained at each stage, the role of each stage will be introduced here.