You are previewing Instant Kali Linux.
O'Reilly logo
Instant Kali Linux

Book Description

A quick guide to learn the most widely-used operating system by network security professionals

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results

  • Covers over 30 different tools included in Kali Linux

  • Easy guide to sett up and install Kali Linux under different hardware sets

  • Step by step examples to get started with pen-testing tools

In Detail

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security assessments.

Teaching you how to use various tools and techniques effectively using Kali while working on real time scenarios, this concise and practical guide wastes no time, moving straight in to the core topic sand covering various important security assessment tools bundled in Kali Linux.

Beginning with the journey through security assessments, from basic features such as information gathering to working on vulnerability assessment tools, web application pen-testing, cracking passwords, and more. The book also moves on to some advanced concepts such as exploitation frameworks and their architecture, forensic tools, and more. The book eloquently covers various levels of information security.

Table of Contents

  1. Instant Kali Linux
    1. Instant Kali Linux
    2. Credits
    3. About the Author
    4. About the Reviewers
      1. Support files, eBooks, discount offers, and more
      1. Why subscribe?
      2. Free access for Packt account holders
    7. 1. Instant Kali Linux
      1. So, what is Kali Linux?
      2. Installation
        1. Step 1 – download and boot
        2. Step 2 – setting the dual boot
        3. Step 3 – beginning with the installation
          1. Installing Kali as a virtual machine
          2. Updating Kali Linux
        4. And that's it
      3. Quick start – getting your tools right
        1. Understanding the memory layout
        2. Information gathering and sniffing with Kali Linux
          1. DNSmap analysis
          2. Network scanners
          3. Detecting live hosts
          4. SSL analysis
          5. Network sniffing
        3. Working with vulnerability assessment tools
        4. Web app penetration testing in Kali
          1. WebScarab proxy
          2. Attacking the database using sqlninja
          3. The Websploit framework
        5. Breaking passwords
          1. John the Ripper
          2. Working with RainbowCrack
        6. Targeting wireless networks
          1. Working with Kismet
          2. Fern WIFI Cracker
          3. Bluetooth auditing
            1. BlueRanger
        7. Exploitation frameworks and tools
          1. Browser Exploitation Framework
          2. Social Engineer Toolkit
        8. Working with forensics tools
          1. Autopsy Forensic Browser
          2. The Sleuth Kit
      4. Top 5 features you need to know about
        1. Information gathering with Nmap
        2. Breaking wireless passwords using Aircrack
        3. Web app penetration testing with Burp Suite
          1. Burp proxy
          2. Burp Spider
          3. Burp Intruder
        4. Metasploit Exploitation Framework
          1. Features of Metasploit
        5. Network forensics using Kali Linux
          1. Network analysis with Wireshark
          2. Rootkit-scanning forensics with chkrootkit
          3. File analysis using md5deep
      5. People and places you should get to know
        1. Official sites
        2. Articles and tutorials
        3. Community
        4. Blogs
        5. Twitter