A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers
Kali Linux, a successor to BackTrack, is one of the most popular Linux distributions used by security professionals and penetration testers to identify and exploit vulnerabilities in the target environment.
As a tester or security practitioner, you'll be taken through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. You'll start by setting up a laboratory environment to validate an application using pentesting tools and techniques. You'll then cover passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll learn how to select, use, customize, and interpret results from different vulnerability scanners, and examine specific routes to the target, such as bypassing physical security and data exfiltration techniques. This Kali Linux book covers concepts such as attacking wireless networks, web services, and embedded devices and gives insights into social engineering.
Once you are confident with these topics, you'll delve into the practical aspects of attacking user client systems by backdooring with fileless techniques, and then shift focus to the most vulnerable part of the network – directly attacking the end user.
By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, and understand pentesting and hacking techniques employed on embedded peripheral devices.
This third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, or security consultant who wants to optimize infrastructure security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.