Kali Linux: Windows Penetration Testing(Paperback)

Wolf Halton, Bo Weaver

  • 出版商: Packt Publishing
  • 出版日期: 2016-06-29
  • 售價: $2,050
  • 貴賓價: 9.5$1,948
  • 語言: 英文
  • 頁數: 422
  • 裝訂: Paperback
  • ISBN: 1782168494
  • ISBN-13: 9781782168492
  • 相關分類: 資訊安全kali-linuxLinux
  • 海外代購書籍(需單獨結帳)




Kali Linux: a complete pen testing toolkit facilitating smooth backtracking for working hackers

About This Book

  • Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux
  • Footprint, monitor, and audit your network and investigate any ongoing infestations
  • Customize Kali Linux with this professional guide so it becomes your pen testing toolkit

Who This Book Is For

If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial.

What You Will Learn

  • Set up Kali Linux for pen testing
  • Map and enumerate your Windows network
  • Exploit several common Windows network vulnerabilities
  • Attack and defeat password schemes on Windows
  • Debug and reverse-engineer Windows programs
  • Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files
  • Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done

In Detail

Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS.

This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important.

Thus, you not only learn penetrating in the machine you also learn Windows privilege's escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.


Kali Linux:一個完整的測試工具包,為工作中的駭客提供順暢的回溯功能


- 使用Kali Linux在MS Windows上進行網絡測試、監控、測試和取證
- 對您的網絡進行足跡、監視和審計,並調查任何正在進行的感染
- 使用這本專業指南自定義Kali Linux,使其成為您的測試工具包

本書適合對Kali Linux有深入了解並希望擴展攻擊技能的工作倫理駭客。對Linux操作系統和BASH終端模擬器以及Windows桌面和命令行的先備知識將非常有益。


- 設置Kali Linux進行測試
- 映射和列舉您的Windows網絡
- 利用幾個常見的Windows網絡漏洞
- 攻擊並破解Windows上的密碼方案
- 調試和反編譯Windows程序
- 恢復丟失的文件,調查成功的黑客攻擊,並在看似無害的文件中發現隱藏的數據
- 在測試完成後,在網絡上捕獲和保持管理權限


Microsoft Windows是兩個最常見的操作系統之一,管理其安全性已經產生了IT安全的學科。Kali Linux是測試和維護Windows安全性的首選平台。Kali基於Debian Linux發行版,並共享該操作系統的傳奇穩定性。這使您可以專注於使用網絡滲透、破解密碼、取證工具,而不是操作系統。

本書提供了最先進的工具和技術,以重現複雜駭客使用的方法,使您成為Kali Linux測試的專家。首先,您將介紹Kali的十大工具和其他有用的報告工具。然後,您將在目標網絡中尋找並確定已知的漏洞,以便能夠遠程利用系統。接下來,您將證明您發現的漏洞是真實且可利用的。您將學習使用七類利用工具。此外,您還將使用websploit等工具進行網絡訪問攻擊。安全性僅取決於鏈中最薄弱的環節。密碼通常是這個薄弱環節。因此,您將了解可以與其他方法結合使用的密碼攻擊,以便入侵和控制網絡。此外,您還將瞭解網絡嗅探,這有助於您了解哪些用戶正在使用您可以利用的服務,以及可以用於污染系統DNS緩存的IP欺騙。一旦您獲得對一台機器或網絡的訪問權限,保持訪問權限就變得很重要。