Ethical Hacking With Kali Linux Learn Fast How To Hack Like A Pro


First, we’re going to start with the Introduction to Linux, you that you have a general idea what it this Operating System is about. Next, we are going to look at same Software & Hardware Recommendations for Ethical Hackers, and jump right into the installation of Vitrual Box & Kali Linux. This book is
mainly about Kali Linux tools and how to deploy them, yet first we have to look at understanding penetration testing, and how it works with reconnaissance and footprinting. We will look at each and every step you should take as a penetration tester which include Stage 1, Stage 2 and Stage 3. This is important so you understand how to take on a job as an ethical hacker. For example what kind of questions you should ask when getting hired by a client. So in this section, we are going to include the what, the when, the how but all legal requirements as well so you can cover your back.

We are also going to look at Penetration Testing Standards so you can decide which one suits you best. Next, we are going to begin more practical by understanding Footprinting and Host discovery with Port Scanning. After that, we are going to get dirty by understanding how you can discover devices with Hping3, how to setup a proxy for Burp Suite and how to target devices with Burp Scanner. Next we are going to look at some Application testing such as Randomizing Sessions Tokens, Spidering & SQL Injection with SQLmap. Then we move on and start looking at both wired and wireless attacks using Kali Linux. We are going to look at Dictionary Attack with Airodump-ng, ARP Poisoning with EtterCAP, and implementing Passive Reconnaissance. Next, we are going to look at capturing both wired and
wireless traffic using Port Mirroring, deploying SYN Scan Attack and using Xplico. Next, we are going to deploy MITM Attack in various ways such as using Ettercap or SSLscript. Moving on, you will learn how to manipulate Packet using the tool called Scapy, and how to capture IPv6 Traffic with Parasite6. Next we are going to implement DoS attacks in various ways, by either using a Deauthentication Attack, or creating a Rogue Access Point or and Evil Twin with a tool called MKD3. Next, we are going to look at
implementing a Brute Force Attack with TCP Hydra, but then we will look at implementing various attacks at the same time on demand, with some very powerful and dangerous tools such as Armitage’s Hail Mary, The Metasploit Framework or SET (Social-Engineering Toolkit). These tools are available for both white hat and black hat hacking.

Table of Contents

  • Chapter 1 Introduction to Linux
  • Chapter 2 Software & Hardware Recommendations
  • Chapter 3 Installing Virtual Box & Kali Linux
  • Chapter 4 Introduction to Penetration Testing
  • Chapter 5 Pen Testing @ Stage 1
  • Chapter 6 Pen Testing @ Stage 2
  • Chapter 7 Pen Testing @ Stage 3
  • Chapter 8 Penetration Testing Standards
  • Chapter 9 Introduction to Footprinting
  • Chapter 10 Host discovery with Port Scanning
  • Chapter 11 Device discovery with Hping3
  • Chapter 12 Burp Suite Proxy setup
  • Chapter 13 Target setup for Burp Scanner
  • Chapter 14 Randomizing Sessions Tokens
  • Chapter 15 Burp Spider-ing & SQL Injection
  • Chapter 16 SQL Injection with SQLmap
  • Chapter 17 Dictionary Attack with Airodump-ng
  • Chapter 18 ARP Poisoning with EtterCAP
  • Chapter 19 Capturing Traffic with Port Mirroring
  • Chapter 20 Passive Reconnaissance with Kali
  • Chapter 21 Capturing SYN Scan Attack
  • Chapter 22 Traffic Capturing with Xplico
  • Chapter 23 MITM Attack with Ettercap
  • Chapter 24 MITM Attack with SSLstrip
  • Chapter 25 Packet Manipulation with Scapy
  • Chapter 26 Deauthentication Attack against Rogue AP
  • Chapter 27 IPv6 Packet Capturing with Parasite6
  • Chapter 28 Evil Twin Deauthentication Attack with mdk3
  • Chapter 29 DoS Attack with MKD3
  • Chapter 30 Brute Force Attack with TCP Hydra
  • Chapter 31 Armitage Hail Mary
  • Chapter 32 The Metasploit Framework
  • Chapter 33 Social-Engineering Toolkit
  • Conclusion
  • About the Author


Happy learning!