Work with over 100 practical recipes to use custom scripts and integrated tools in Kali Linux, and effectively master network scanning
Key Features
- Learn the fundamentals behind commonly used scanning techniques
- Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
- Explore practical recipes that will help you automate menial tasks and build your own script library
Book Description
With the ever-increasing amount of data flow in recent times, information security has become vital to any application. This is where Kali Linux plays a significant role, focusing mainly on security auditing and penetration testing. This cookbook on network scanning will train you in important scanning concepts based on version 2016.2. You'll be able to conquer any network environment by exploring a range of network scanning techniques, and learning how to script your very own tools.
Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, and fingerprinting. You will then learn how to use the tools available in Kali Linux to conquer any network environment. The book also offers extensive coverage of the popular Burp Suite and features new and updated scripts for automating scanning and target exploitation. In later chapters, you'll understand how to identify remote services and assess security risks, along with discovering how different attacks are performed. Finally, you will cover the latest features of Kali Linux 2016.2, including the enhanced Sparta tool and a variety of exciting updates.
By the end of this book, you will be equipped with the skills you need to effectively script your own tools and become an expert at network scanning.
What you will learn
- Develop a network testing environment to test scanning tools and techniques
- Understand the principles of network scanning tools by building scripts and tools
- Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited
- Perform comprehensive scans to identify listening on TCP and UDP sockets
- Explore different Kali desktop environments - KDE, MATE, LXDE, and Xfce
- Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more
- Evaluate DoS threats and learn how common DoS attacks are performed
- Discover how to use the Burp Suite to evaluate web applications
Who this book is for
If you're an information security professional or anyone who wants to learn all about it, this book is for you. The foundational principles covered in the book will help you if you're a beginner, while the scripting techniques and in-depth analysis will be particularly useful if you're already at an advanced level. Basic security testing experience is assumed.
Table of Contents
- Getting Started
- Reconnaissance
- Discovery
- Port Scanning
- Fingerprinting
- Vulnerability Scanning
- Denial of Service
- Working with Burp Suite
- Web Application Scanning