• Complain

Dieterle - Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use

Here you can read online Dieterle - Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Leipzig, year: 2014;2015, publisher: Createspace, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use
  • Author:
  • Publisher:
    Createspace
  • Genre:
  • Year:
    2014;2015
  • City:
    Leipzig
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.
In Basic Security Testing with Kali Linux, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.
This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the Hackers Google) Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your Network Though no network can be completely Hacker Proof, knowing how an attacker works will help put you on the right track of better securing your network.

Dieterle: author's other books


Who wrote Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use? Find out the surname, the name of the author of the book and a list of all author's works by series.

Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Basic Security Testing with Kali Linux Cover design and photo provided by - photo 1


Basic Security Testing with Kali Linux

Cover design and photo provided by Moriah Dieterle.

Copyright 2013 by Daniel W. Dieterle. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher.

All trademarks, registered trademarks and logos are the property of their respective owners.

ISBN-13: 978-1494861278


Thanks to my family for their unending support and prayer, you are truly a gift from God!

Thanks to my friends in the infosec & cybersecurity community for sharing your knowledge and time with me. And thanks to my friends in our local book writers club (especially you Bill!), without your input, companionship and advice, this would have never happened.

Daniel Dieterle

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles - Sun Tzu

Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves. - Matthew 10:16 (KJV)


About the Author

Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use - image 2 Daniel W. Dieterle has worked in the IT field for over 20 years. During this time he worked for a computer support company where he provided computer and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania.

He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League schools computer support department and served as an executive at an electrical engineering company.

For about the last 5 years Daniel has been completely focused on security. He created and authors the CyberArms Computer Security Blog , and his articles have been published in international security magazines, and referenced by both technical entities and the media.

Daniel has assisted with numerous security training classes and technical training books mainly based on Backtrack and Kali Linux.

Daniel W. Dieterle

C yberarms@live.com

Cyberarms.wordpress.com


Table of Contents


Chapter 1 - Introduction

What is Kali?

Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testing distribution. The creators of the Backtrack series kept Kali in a format very similar to Backtrack, so anyone familiar with the older Backtrack platform will feel right at home.

Kali has been re-vamped from the ground up to be the best and most feature rich Ethical Hacking/ Pentesting distribution available. Kali also runs on more hardware devices greatly increasing your options for computer security penetration testing or pentesting systems.

If you are coming to Kali from a Backtrack background, after a short familiarization period you should find that everything is very similar and your comfort level should grow very quickly.

If you are new to Kali, once you get used to it, you will find an easy to use security testing platform that includes hundreds of useful and powerful tools to test and help secure your network systems.

Why Use Kali?

Kali includes over 300 security testing tools. A lot of the redundant tools from Backtrack have been removed and the tool interface streamlined. You can now get to the most used tools quickly as they appear in a top ten security tool menu. You can also find these same tools and a plethora of others all neatly categorized in the menu system.

Kali allows you to use similar tools and techniques that a hacker would use to test the security of your network so you can find and correct these issues before a real hacker finds them.

Tech Note:

Hackers usually perform a combination of steps when attacking a network. These steps are summarized below:

  • Recon Checking out the target using multiple sources like intelligence gathering.
  • Scanning Mapping out and investigating your network.
  • Exploitation Attacking holes found during the scanning process.
  • Elevation of Privileges Elevating a lower access account to Root, or System Level.
  • Maintaining Access Using techniques like backdoors to keep access to your network.
  • Covering their Tracks Erasing logs, and manipulating files to hide the intrusion.

An Ethical Hacker or Penetration Tester (good guys hired to find the holes before an attacker does) mimics many of these techniques, using parameters and guidelines set up with corporate management, to find security issues.

They then report their findings to management and assist in correcting the issues.

We will not be covering every step in the process, but will show you many of the techniques that are used, and how to defend against them.

I would think the biggest drive to use Kali over commercial security solutions is the price. Security testing tools can be extremely costly, Kali is free! Secondly, Kali includes open source versions of numerous commercial security products, so you could conceivably replace costly programs by simply using Kali.

All though Kali does includes several free versions of popular software programs that can be upgraded to the full featured paid versions and used directly through Kali.

There really are no major tool usage differences between Backtrack and Kali. Kali is basically Backtrack version 6, or the latest version of Backtrack. But it has been completely retooled from the ground up, making software updates and additions much easier.

In Backtrack updating some programs seemed to break others, in Kali, you update everything using the Kali update command which keeps system integrity much better.

Simply update Kali and it will pull down the latest versions of the included tools for you. Just a note of caution, updating tools individually could break Kali, so running the Kali update is always the best way to get the latest packages for the OS.

I must admit though, some tools that I liked in the original Backtrack are missing in Kali. It is not too big of a deal as another tool in Kali most likely does the same or similar thing. And then again you can install other programs you like if needed.

In addition to stand alone and virtual machine instances of Kali, I also use Kali on a Raspberry Pi - a mini credit card sized ARM based computer. With Kali, you can do almost everything on a Pi that you could do on a full sized system. In my book I will cover using the PI as a security testing platform including testing Wireless networks.

Testing networks with a computer you could fit in your pocket, how cool is that?

Though Kali cant possibly contain all the possible security tools that every individual would prefer, it contains enough that Kali could be used from beginning to end. Dont forget that Kali is not just a security tool, but a full-fledged Linux Operating System. So if your favorite tool runs under Linux, but is not included, most likely you can install and run it in Kali.

Ethical Hacking Issues

Using Ethical Hacking a security tester basically acts like a hacker. He uses tools and techniques that a hacker would most likely use to test a target networks security. The difference is, the penetration tester is hired by the company to test its security and when done reveals to the leadership team how they got in and what they can do to plug the holes.

The biggest issue I see in using these techniques is ethics and law. Some security testing techniques that you can perform with Kali and its included tools are actually illegal to do in some areas. So it is important that users check their local, State and Federal laws before using Kali.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use»

Look at similar books to Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use»

Discussion, reviews of the book Basic security testing with Kali Linux test your computer system security by using the same tactics that an attacker would use and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.