Published by CreateSpace Independent Publishing Platform on 2014-01-05
Genres: Computers, General, Security
Buy on Amazon.com, Buy on Amazon.co.uk
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.In “Basic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system. This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the “Hacker's Google”) Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your NetworkThough no network can be completely “Hacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.
I quite fancy the idea of taking some of the Offensive Security certifications, but they are expensive and once paid for time limited to complete! So as a precursor I’m reading up on some of the tools and techniques that you are expected to learn about on the course and playing with the Kali Linux penetration testing distribution.
Basic Security Testing With Kali Linux is a lot of fun. I breezed through the book as I’m familiar with all the concepts already but it is aimed at the beginner so if you have no penetration testing experience you’ll be fine.
The book mostly covers the following topics, getting Kali Linux installed, installing an exploitable platform such as Metasploitable2 or Windows XP/7, then using the tools available in Kali Linux to gather information about the platforms, identify vulnerabilities then finally exploit those vulnerabilities using Metasploit and the various exploits and shells available. There are also several chapters on wireless security, how to conduct man-in-the-middle attacks and how to crack in to wireless networks.
The book is a great for ‘script kiddies’ as it doesn’t really go in to the guts of how things like buffer overflows work and what is actually going on when you use the tools, but it’s a great starting point and introduction to penetration testing.