Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux 🔍
Joseph Muniz, Aamir Lakhani Packt Publishing, Limited, Packt Publishing, Birmingham, 2013
英语 [en] · PDF · 21.2MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them. Approach "Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user. Who this book is for "Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful. Read more... Abstract: In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them. Approach "Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user. Who this book is for "Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful
备用文件名
upload/misc/IXKXcI5mZnjhFnLAUPaa/E-Books/computer/unixandlinux/9781782163169_web_penetration_testing_with_kali_linux_6e39.pdf
备用文件名
upload/misc_2025_10/IXKXcI5mZnjhFnLAUPaa/E-Books/computer/unixandlinux/9781782163169_web_penetration_testing_with_kali_linux_6e39.pdf
备用文件名
lgli/I:\it-books_dl\1878\Web Penetration Testing with Kali Linux.pdf
备用文件名
lgrsnf/I:\it-books_dl\1878\Web Penetration Testing with Kali Linux.pdf
备用文件名
nexusstc/Web Penetration Testing with Kali Linux/37f80fd24a3d9478f685e9ab0a73858d.pdf
备用文件名
zlib/Computers/Joseph Muniz, Aamir Lakhani/Web Penetration Testing with Kali Linux: A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux_2734892.pdf
备选标题
WordPress Theme Development Beginner's Guide Third Edition
备选作者
Muniz, Joseph, Lakhani, Aamir
备选作者
www.it-ebooks.info
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
New edition, Birmingham, Aug. 2013
备用版本
Sep 25, 2013
备用版本
1, 20130925
元数据中的注释
lg1526030
元数据中的注释
producers:
www.it-ebooks.info
元数据中的注释
{"isbns":["1782163166","1782163174","9781782163169","9781782163176"],"last_page":342,"publisher":"Packt Publishing"}
备用描述
Preface 18
Chapter 1: Penetration Testing
and Setup 24
Web application Penetration Testing concepts 25
Penetration Testing methodology 26
Calculating risk 31
Kali Penetration Testing concepts 34
Step 1 – Reconnaissance 34
Step 2 – Target evaluation 35
Step 3 – Exploitation 36
Step 4 – Privilege Escalation 36
Step 5 – maintaining a foothold 37
Introducing Kali Linux 38
Kali system setup 38
Running Kali Linux from external media 38
Installing Kali Linux 39
Kali Linux and VM image first run 46
Kali toolset overview 46
Summary 48
Chapter 2: Reconnaissance 50
Reconnaissance objectives 51
Initial research 51
Company website 52
Web history sources 53
Regional Internet Registries (RIRs) 56
Electronic Data Gathering, Analysis, and Retrieval (EDGAR) 57
Social media resources 58
Trust 58
Job postings 58
Location 59
Shodan 59
Google hacking 61
Google Hacking Database 62
Researching networks 65
HTTrack – clone a website 66
ICMP Reconnaissance techniques 69
DNS Reconnaissance techniques 70
DNS target identification 72
Maltego – Information Gathering graphs 74
Nmap 76
FOCA – website metadata Reconnaissance 83
Summary 89
Chapter 3: Server-side Attacks 90
Vulnerability assessment 91
Webshag 91
Skipfish 95
ProxyStrike 98
Vega 102
Owasp-Zap 106
Websploit 112
Exploitation 113
Metasploit 113
w3af 119
Exploiting e-mail systems 122
Brute-force attacks 124
Hydra 124
DirBuster 127
WebSlayer 130
Cracking passwords 136
John the Ripper 136
Man-in-the-middle 138
SSL strip 139
Starting the attack – redirection 140
Setting up port redirection using Iptables 141
Summary 144
Chapter 4: Client-side Attacks 146
Social engineering 146
Social Engineering Toolkit (SET) 147
Using SET to clone and attack 149
MitM Proxy 160
Host scanning 161
Host scanning with Nessus 162
Installing Nessus on Kali 162
Using Nessus 163
Obtaining and cracking user passwords 168
Windows passwords 170
Mounting Windows 171
Linux passwords 172
Kali password cracking tools 172
Johnny 173
hashcat and oclHashcat 176
samdump2 178
chntpw 178
Ophcrack 182
Crunch 185
Other tools available in Kali 187
Hash-identifier 187
dictstat 188
RainbowCrack (rcracki_mt) 189
findmyhash 190
phrasendrescher 190
CmosPwd 190
creddump 191
Summary 191
Chapter 5: Attacking Authentication 192
Attacking session management 194
Clickjacking 194
Hijacking web session cookies 195
Web session tools 196
Firefox plugins 197
Firesheep – Firefox plugin 197
Web Developer – Firefox plugin 197
Greasemonkey – Firefox plugin 198
Cookie Injector – Firefox plugin 199
Cookies Manager+ – Firefox plugin 200
Cookie Cadger 201
Wireshark 204
Hamster and Ferret 207
Man-in-the-middle attack 210
dsniff and arpspoof 210
Ettercap 213
Driftnet 215
SQL Injection 217
sqlmap 220
Cross-site scripting (XSS) 221
Testing cross-site scripting 222
XSS cookie stealing / Authentication hijacking 223
Other tools 225
urlsnarf 225
acccheck 226
hexinject 226
Patator 227
DBPwAudit 227
Summary 227
Chapter 6: Web Attacks 228
Browser Exploitation Framework – BeEF 228
FoxyProxy – Firefox plugin 233
BURP Proxy 235
OWASP – ZAP 242
SET password harvesting 247
Fimap 251
Denial of Services (DoS) 252
THC-SSL-DOS 253
Scapy 255
Slowloris 257
Low Orbit Ion Cannon 259
Other tools 262
DNSCHEF 262
SniffJoke 263
Siege 264
Inundator 265
TCPReplay 265
Summary 266
Chapter 7: Defensive Countermeasures 268
Testing your defenses 269
Baseline security 270
STIG 271
Patch management 271
Password policies 273
Mirror your environment 274
HTTrack 274
Other cloning tools 276
Man-in-the-middle defense 276
SSL strip defense 278
Denial of Service defense 279
Cookie defense 280
Clickjacking defense 281
Digital forensics 282
Kali Forensics Boot 283
Filesystem analysis with Kali 284
dc3dd 286
Other forensics tools in Kali 288
chkrootkit 288
Autopsy 288
Binwalk 291
pdf-parser 292
Foremost 292
Pasco 292
Scalpel 293
bulk_extractor 293
Summary 293
Chapter 8: Penetration Test
Executive Report 294
Compliance 295
Industry standards 296
Professional services 297
Documentation 299
Report format 299
Cover page 300
Confidentiality statement 300
Document control 301
Timeline 301
Executive summary 302
Methodology 303
Detailed testing procedures 305
Summary of findings 306
Vulnerabilities 307
Network considerations and recommendations 309
Appendices 311
Glossary 311
Statement of Work (SOW) 312
External Penetration Testing 313
Additional SOW material 315
Kali reporting tools 317
Dradis 317
KeepNote 318
Maltego CaseFile 318
MagicTree 318
CutyCapt 319
Sample reports 319
Summary 328
Index 330
www.it-ebooks.info
IT eBooks
备用描述
<p><h2>In Detail</h2><p>Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.</p><p>Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.</p><p>"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.</p><p>You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.</p><p>On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.</p><h2>Approach</h2><p>"Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.</p><h2>Who this book is for</h2><p>"Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.</p></p>
备用描述
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit. Overview In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them. What you will learn from this book Approach "Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.
开源日期
2016-06-29
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。