Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /: over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning. (2014)
- Record Type:
- Book
- Title:
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /: over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning. (2014)
- Main Title:
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Other Titles:
- Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Further Information:
- Note: Justin Hutchens.
- Other Names:
- Hutchens, Justin
- Contents:
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Getting Started; Configuring a security lab with VMware Player (Windows); Configuring a security lab with VMware Fusion (Mac OS X); Installing Ubuntu Server; Installing Metasploitable2; Installing Windows Server; Increasing the Windows attack surface; Installing Kali Linux; Configuring and using SSH; Installing Nessus on Kali Linux; Configuring Burp Suite on Kali Linux; Using text editors (VIM and Nano); Chapter 2: Discovery Scanning. Using Scapy to perform layer 2 discoveryUsing ARPing to perform layer 2 discovery; Using Nmap to perform layer 2 discovery; Using NetDiscover to perform layer 2 discovery; Using Metasploit to perform layer 2 discovery; Using ICMP ping to perform layer 3 discovery; Using Scapy to perform layer 3 discovery; Using Nmap to perform layer 3 discovery; Using fping to perform layer 3 discovery; Using hping3 to perform layer 3 discovery; Using Scapy to perform layer 4 discovery; Using Nmap to perform layer 4 discovery; Using hping3 to perform layer 4 discovery; Chapter 3: Port Scanning. UDP port scanningTCP port scanning; UDP scanning with Scapy; UDP scanning with Nmap; UDP scanning with Metasploit; Stealth scanning with Scapy; Stealth scanning with Nmap; Stealth scanning with Metasploit; Stealth scanning with Hping3; Connect scanning with Scapy; Connect scanning with Nmap; Connect scanning with Metasploit; ConnectCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Getting Started; Configuring a security lab with VMware Player (Windows); Configuring a security lab with VMware Fusion (Mac OS X); Installing Ubuntu Server; Installing Metasploitable2; Installing Windows Server; Increasing the Windows attack surface; Installing Kali Linux; Configuring and using SSH; Installing Nessus on Kali Linux; Configuring Burp Suite on Kali Linux; Using text editors (VIM and Nano); Chapter 2: Discovery Scanning. Using Scapy to perform layer 2 discoveryUsing ARPing to perform layer 2 discovery; Using Nmap to perform layer 2 discovery; Using NetDiscover to perform layer 2 discovery; Using Metasploit to perform layer 2 discovery; Using ICMP ping to perform layer 3 discovery; Using Scapy to perform layer 3 discovery; Using Nmap to perform layer 3 discovery; Using fping to perform layer 3 discovery; Using hping3 to perform layer 3 discovery; Using Scapy to perform layer 4 discovery; Using Nmap to perform layer 4 discovery; Using hping3 to perform layer 4 discovery; Chapter 3: Port Scanning. UDP port scanningTCP port scanning; UDP scanning with Scapy; UDP scanning with Nmap; UDP scanning with Metasploit; Stealth scanning with Scapy; Stealth scanning with Nmap; Stealth scanning with Metasploit; Stealth scanning with Hping3; Connect scanning with Scapy; Connect scanning with Nmap; Connect scanning with Metasploit; Connect scanning with Dmitry; TCP port scanning with Netcat; Zombie scanning with Scapy; Zombie scanning with Nmap; Chapter 4: Fingerprinting; Banner grabbing with Netcat; Banner grabbing with Python sockets; Banner grabbing with Dmitry; Banner grabbing with Nmap NSE. Banner grabbing with AmapService identification with Nmap; Service identification with Amap; Operating system identification with Scapy; Operating system identification with Nmap; Operating system identification with xProbe2; Passive operating system identification with p0f; SNMP analysis with Onesixtyone; SNMP analysis with SNMPwalk; Firewall identification with Scapy; Firewall identification with Nmap; Firewall identification with Metasploit; Chapter 5: Vulnerability Scanning; Vulnerability scanning with Nmap Scripting Engine; Vulnerability scanning with MSF auxiliary modules. Creating scan policies with NessusVulnerability scanning with Nessus; Command-line scanning with Nessuscmd; Validating vulnerabilities with HTTP interaction; Validating vulnerabilities with ICMP interaction; Chapter 6: Denial of Service; Fuzz testing to identify buffer overflows; Remote FTP service buffer overflow DoS; Smurf DoS attack; DNS amplification DoS attack; SNMP amplification DoS attack; NTP amplification DoS attack; SYN flood DoS attack; Sock stress DoS attack; DoS attacks with Nmap NSE; DoS attacks with Metasploit; DoS attacks with the exploit database. … (more)
- Publisher Details:
- Birmingham, UK : Packt Pub
- Publication Date:
- 2014
- Extent:
- 1 online resource (1 volume), illustrations
- Subjects:
- 005.8
COMPUTERS -- Security -- Networking
Computers -- Access control
Computer security
Penetration testing (Computer security)
Computer networks -- Security measures
Computers -- Access control
Computer security
Penetration testing (Computer security)
Computer networks -- Security measures
Computer networks -- Security measures
Computer security
Computers -- Access control
Penetration testing (Computer security)
Computers / Access control
Computer security
Penetration testing (Computer security)
Computer networks / Security measures
COMPUTERS -- Security -- General
Electronic books - Languages:
- English
- ISBNs:
- 9781783982158
1783982152
1783982144
9781783982141 - Related ISBNs:
- 9781783982141
- Notes:
- Note: Online resource; title from title page (Safari, viewed Sept. 17, 2014).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.87897
- Ingest File:
- 01_042.xml