Test Your Computer System Security by using the same Tactics that an Attacker would use.
Table of Contents
Chapter 1 – Introduction
- What is Kali?
- Why Use Kali?
- Ethical Hacking Issues
- Scope of this Book
- Why did I write this book?
- Disclaimer
Part 1: Installing and Basic Overview
- Chapter 2 – Installing Kali with VMWare Player
- Install VMWare Player & Kali
- Updating Kali
- Installing VMWare Tools for Linux
- Installing Metasploitable 2
- Windows Virtual Machines
- Quick Desktop Tour
Part 2 – Metasploit Tutorial
- Chapter 3 – Introduction to Metasploit
- Metasploit Overview
- Picking an Exploit
- Setting Exploit Options
- Multiple Target Types
- Getting a remote shell on a Windows XP Machine
- Picking a Payload
- Setting Payload Options
- Running the Exploit
- Connecting to a Remote Session
Chapter 4 – Meterpreter Shell
- Basic Meterpreter Commands
- Core Commands
- File System Commands
- Network Commands
- System Commands
- Capturing Webcam Video, Screenshots and Sound
- Running Scripts
- Playing with Modules – Recovering Deleted Files from Remote System
Part 3 – Information Gathering & Mapping
- Chapter 5 – Recon Tools
- Recon-NG
- Using Recon-NG
- Dmitry
- Netdiscover
- Zenmap
- Chapter 6 – Shodan
- Why scan your network with Shodan?
- Filter Guide
- Filter Commands
- Combined Searches
- Shodan Searches with Metasploit
- Part 3 – Attacking Hosts
- Chapter 7 – Metasploitable Tutorial – Part One
- Installing and Using Metasploitable
- Scanning for Targets
- Exploiting the Unreal IRC Service
- Chapter 8 – Metasploitable – Part Two: Scanners
- Using a Scanner
- Using Additional Scanners
- Scanning a Range of Addresses
- Exploiting the Samba Service
- Chapter 9 – Windows AV Bypass with Veil
- Installing Veil
- Using Veil
- Getting a Remote Shell
- Chapter 10 – Windows Privilege Escalation by Bypassing UAC
- UAC Bypass
- Chapter 11 – Packet Captures and Man-in-the-Middle Attacks
- Creating a Man-in-the-Middle attack with Arpspoof
- Viewing URL information with Urlsnarf
- Viewing Captured Graphics with Driftnet
- Remote Packet Capture in Metasploit
- Wireshark
- Xplico
- Chapter 12 – Using the Browser Exploitation Framework
- BeEF in Action
PART FOUR – Social Engineering
- Chapter 13 – Social Engineering
- Introduction
- Social Engineering Defense
- Chapter 14 – The Social Engineering Toolkit
- Staring SET
- Mass Emailer
- SET ’ s Java PYInjector Attack
- Social Engineering Toolkit: PowerShell Attack Vector
- More Advanced Attacks with SET
- Chapter 15 – Subterfuge
- Automatic Browser Attack with Subterfuge
- Browser Autopwn
PART FIVE – Password Attacks
- Chapter 16 – Cracking Simple LM Hashes
- Cracking LM passwords Online
- Looking up Hashes in Kali
- Chapter 17 – Pass the Hash
- Passing the Hash with Psexec
- Passing the Hash Toolkit
- Defending against Pass the Hash Attacks
- Chapter 18 – Mimikatz Plain Text Passwords
- Loading the Module
- Recovering Hashes and Plain Text Passwords
- Chapter 19 – Mimikatz and Utilman
- Utilman Login Bypass
- Recovering password from a Locked Workstation
- Chapter 20 – Keyscan and Lockout Keylogger
- Key logging with Meterpreter
- Automating KeyScanning with Lockout Keylogger
- Chapter 21 – HashCat
- Cracking NTLM passwords
- Cracking harder passwords
- Using a Larger Dictionary File
- More advanced cracking
- Chapter 22 – Wordlists
- Wordlists Included with Kali
- Wordlist Generator
- Crunch
- Download Wordlists from the Web
- Chapter 23 – Cracking Linux Passwords
- Cracking Linux Passwords
- Automating Password Attacks with Hydra
PART SIX – Router and Wi-Fi Attacks
- Chapter 24 – Router Attacks
- Router Passwords
- Routerpwn
- Wi-Fi Protected Setup (WPS)
- Attacking WPS with Reaver
- Attacking WPS with Fern WiFi Cracker
- Cracking WPS with Wifite
- Chapter 25 – Wireless Network Attacks
- Wireless Security Protocols
- Viewing Wireless Networks with Airmon-NG
- Viewing Wi-Fi Packets and Hidden APs in Wireshark
- Turning a Wireless Card into an Access Point
- Using MacChanger to Change the Address (MAC) of your Wi-Fi Card
- Chapter 26 – Fern WIFI Cracker
- Using Fern
- Chapter 27 – Wi-Fi Testing with WiFite
- Using WiFite
- More advanced attacks with WiFite
- Chapter 28 – Kismet
- Scanning with Kismet
- Analyzing the Data
- Chapter 29 – Easy Creds
- Installing Easy-Creds
- Creating a Fake AP with SSL strip Capability
- Recovering passwords from secure sessions
PART SEVEN – Raspberry Pi
- Chapter 30 – Installing Kali on a Raspberry Pi
- Pi Power Supplies and Memory Cards
- Installing Kali on a Raspberry Pi
- Connecting to a “ Headless ” Pi remotely from a Windows system
- Viewing Graphical X Windows Programs Remotely through Putty
- Chapter 31 – WiFi Pentesting on a Raspberry Pi
- Basic Wi-Fi Pentesting using a Raspberry Pi
- WEP and WPA/WPA2 Cracking
- CHAPTER EIGHT – Defending your Network
- Chapter 32 – Network Defense and Conclusion
- Patches & Updates
- Firewalls and IPS
- Anti-Virus/ Network Security Programs
- Limit Services & Authority Levels
- Use Script Blocking Programs
- Use Long Complex Passwords
- Network Security Monitoring
- Logging
- Educate your users
- Scan your Network
- Learn Offensive Computer Security
- Index