You are previewing Hacking with Kali.
O'Reilly logo
Hacking with Kali

Book Description

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services.

Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.



  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the Kali information, resources and distribution downloads
  • Hands-on exercises reinforce topics

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Chapter 1. Introduction
    1. Information in This Chapter
    2. Book Overview and Key Learning Points
    3. Book Audience
    4. Diagrams, Figures, and Screen Captures
    5. Welcome
    6. Penetration Testing Lifecycle
    7. Terms
    8. Kali History
    9. References
  7. Chapter 2. Download and Install Kali Linux
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Kali Linux
    4. System Information
    5. Downloading Kali
    6. Hard Drive Installation
    7. Thumb Drive Installation
    8. SD Card Installation
    9. Summary
  8. Chapter 3. Software, Patches, and Upgrades
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. APT Package Handling Utility
    4. Debian Package Manager
    5. Tarballs
    6. A Practical Guide to Installing Nessus
    7. Conclusion
  9. Chapter 4. Configuring Kali Linux
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. About This Chapter
    4. The Basics of Networking
    5. Using the Graphical User Interface to Configure Network Interfaces
    6. Using the Command Line to Configure Network Interfaces
    7. Using the GUI to Configure Wireless Cards
    8. Web Server
    9. FTP Server
    10. SSH Server
    11. Configure and Access External Media
    12. Updating Kali
    13. Upgrading Kali
    14. Adding a Repository Source
    15. Summary
  10. Chapter 5. Building a Penetration Testing Lab
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Before Reading This Chapter: Build a Lab
    4. Building a Lab on a Dime
    5. Metasploitable2
    6. Extending Your Lab
    7. The Magical Code Injection Rainbow
  11. Chapter 6. Introduction to the Penetration Test Lifecycle
    1. Information in This Chapter
    2. Chapter Overview And Key Learning Points
    3. Introduction to the Lifecycle
    4. Phase 1: Reconnaissance
    5. Phase 2: Scanning
    6. Phase 3: Exploitation
    7. Phase 4: Maintaining Access
    8. Phase 5: Reporting
    9. Summary
  12. Chapter 7. Reconnaissance
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Introduction
    4. Start with the Targets Own Website
    5. Website Mirroring
    6. Google Searches
    7. Google Hacking
    8. Social Media
    9. Job Sites
    10. DNS and DNS Attacks
    11. Query a Name Server
    12. Zone Transfer
    13. Reference
  13. Chapter 8. Scanning
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Introduction to Scanning
    4. Understanding Network Traffic
    5. NMAP the King of Scanners
    6. Selecting Ports
    7. HPING3
    8. Nessus
    9. Summary
  14. Chapter 9. Exploitation
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Introduction
    4. An Overview of Metasploit
    5. Accessing Metasploit
    6. Web Server and Web Application Exploitation
    7. Conclusion
  15. Chapter 10. Maintaining Access
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Introduction
    4. Terminology and Core Concepts
    5. Backdoors
    6. Keyloggers
    7. Summary
    8. Reference
  16. Chapter 11. Reports and Templates
    1. Information in This Chapter
    2. Chapter Overview and Key Learning Points
    3. Reporting
    4. Presentation
    5. Report and Evidence Storage
    6. Summary
  17. Appendix A. Tribal Chicken
    1. Comprehensive Setup and Configuration Guide for Kali Linux 1.0.5
    2. Materials List
    3. Install and Configure Ubuntu
    4. Install Kali Linux 1.0.5
    5. Customize the Interface
    6. Running Updates
    7. Building an ISO using Tribal Chicken
    8. Burning an ISO to a DVD or Blu-Ray Disc
    9. Testing and Validation (Short Version)
  18. Appendix B. Kali Penetration Testing Tools
  19. Index