Preface
This book is about the use of Kali Linux in performing penetration tests against networks, systems, and applications. A penetration test simulates an attack against a network or a system by a malicious outsider or insider. Unlike a vulnerability assessment, penetration testing is designed to include the exploitation phase. Therefore, it proves that the exploit is present and that the system is at risk of being compromised if not acted upon.
Throughout this book, we will refer to penetration testers, attackers, pentesters, and hackers interchangeably as they use the same techniques and tools to assess the security of networks and data systems. The only difference between them is their end objective—infiltrating a secure data network or a data breach.
Readers must be aware that it is illegal to knowingly/intentionally scan or access a protected computer or network without explicit approval.
In short, this book will take you through a journey of a penetration tester with many proven techniques to defeat the latest defenses on a network using Kali Linux. From selecting the most effective tools, to rapidly compromising network security to highlighting the techniques used to avoid detection.