Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Improving your Penetration Testing Skills

You're reading from   Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit

Arrow left icon
Product type Course
Published in Jul 2019
Publisher Packt
ISBN-13 9781838646073
Length 712 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (4):
Arrow left icon
Daniel Teixeira Daniel Teixeira
Author Profile Icon Daniel Teixeira
Daniel Teixeira
Juned Ahmed Ansari Juned Ahmed Ansari
Author Profile Icon Juned Ahmed Ansari
Juned Ahmed Ansari
Abhinav Singh Abhinav Singh
Author Profile Icon Abhinav Singh
Abhinav Singh
Gilberto Najera-Gutierrez Gilberto Najera-Gutierrez
Author Profile Icon Gilberto Najera-Gutierrez
Gilberto Najera-Gutierrez
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Title Page
Copyright About Packt Contributors Preface 1. Introduction to Penetration Testing and Web Applications FREE CHAPTER 2. Setting Up Your Lab with Kali Linux 3. Reconnaissance and Profiling the Web Server 4. Authentication and Session Management Flaws 5. Detecting and Exploiting Injection-Based Flaws 6. Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities 7. Cross-Site Request Forgery, Identification, and Exploitation 8. Attacking Flaws in Cryptographic Implementations 9. Using Automated Scanners on Web Applications 10. Metasploit Quick Tips for Security Professionals 11. Information Gathering and Scanning 12. Server-Side Exploitation 13. Meterpreter 14. Post-Exploitation 15. Using MSFvenom 16. Client-Side Exploitation and Antivirus Bypass 17. Social-Engineer Toolkit 18. Working with Modules for Penetration Testing 1. Other Books You May Enjoy

Setting Up Your Lab with Kali Linux

Preparation is the key to everything; it becomes even more important when working on a penetration testing project, where you get a limited amount of time for reconnaissance, scanning, and exploitation. Eventually, you can gain access and present a detailed report to the customer. Each penetration test that you conduct will be different in nature and may require a different approach from the tests that you conducted earlier. Tools play a major role in penetration testing. So, you need to prepare your toolkit beforehand and have hands-on experience with all of the tools that you will need to execute the test.

In this chapter, we will cover the following topics:

  • An overview of Kali Linux and changes from the previous version
  • The different ways of installing Kali Linux
  • Virtualization versus installation on physical hardware
  • A walk-through and configuration...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £16.99/month. Cancel anytime