Work with over 100 practical recipes to use custom scripts and integrated tools in Kali Linux, and effectively master network scanning
Key FeaturesLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrated into the Kali Linux testing platformExplore practical recipes that will help you automate menial tasks and build your own script libraryBook DescriptionWith the ever-increasing amount of data flow in recent times, information security has become vital to any application. This is where Kali Linux plays a significant role, focusing mainly on security auditing and penetration testing. This cookbook on network scanning will train you in important scanning concepts based on version 2016.2. You'll be able to conquer any network environment by exploring a range of network scanning techniques, and learning how to script your very own tools.
Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, and fingerprinting. You will then learn how to use the tools available in Kali Linux to conquer any network environment. The book also offers extensive coverage of the popular Burp Suite and features new and updated scripts for automating scanning and target exploitation. In later chapters, you'll understand how to identify remote services and assess security risks, along with discovering how different attacks are performed. Finally, you will cover the latest features of Kali Linux 2016.2, including the enhanced Sparta tool and a variety of exciting updates.
By the end of this book, you will be equipped with the skills you need to effectively script your own tools and become an expert at network scanning.
What you will learnDevelop a network testing environment to test scanning tools and techniquesUnderstand the principles of network scanning tools by building scripts and toolsIdentify distinct vulnerabilities in web apps and remote services and learn how they are exploitedPerform comprehensive scans to identify listening on TCP and UDP socketsExplore different Kali desktop environments - KDE, MATE, LXDE, and XfceUse Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and moreEvaluate DoS threats and learn how common DoS attacks are performedDiscover how to use the Burp Suite to evaluate web applicationsWho this book is forIf you're an information security professional or anyone who wants to learn all about it, this book is for you. The foundational principles covered in the book will help you if you're a beginner, while the scripting techniques and in-depth analysis will be particularly useful if you're already at an advanced level. Basic security testing experience is assumed.
Table of ContentsGetting StartedReconnaissanceDiscoveryPort ScanningFingerprintingVulnerability ScanningDenial of ServiceWorking with Burp SuiteWeb Application Scanning