Web Penetration Testing with Kali Linux Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.

    • 5.0 • 5개의 평가
    • US$34.99
    • US$34.99

출판사 설명

Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.

Key Features
Learn key reconnaissance concepts needed as a penetration testerAttack and exploit key features, authentication, and sessions on web applicationsLearn how to protect systems, write reports, and sell web penetration testing services
Book Description
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.

Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.

"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.

You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.

On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.
What you will learn
Perform vulnerability reconnaissance to gather information on your targetsExpose server vulnerabilities and take advantage of them to gain privileged accessExploit client-based systems using web application protocolsLearn how to use SQL and cross-site scripting (XSS) attacksSteal authentications through session hijacking techniquesHarden systems so other attackers do not exploit them easilyGenerate reports for penetration testersLearn tips and trade secrets from real world penetration testers
Who this book is for
"Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.

장르
컴퓨터 및 인터넷
출시일
2013년
9월 25일
언어
EN
영어
길이
342
페이지
출판사
Packt Publishing
판매자
Ingram DV LLC
크기
58.5
MB

사용자 리뷰

Hack3rz ,

Be a ninja

The book explains step by step on how to use Kali Linux for web penetration testing. It is a great resource for pros and beginners. The author of this book is the famous Aamir Lakhani, aka Dr. Chaos who documented the Apple zero day SMS. I found out about this book at ISC2 Security Congress and got a chance to meet the one of the authors. Trust me This book will turn you into a ninja. I also recommend his second book XenMobile MDM.

JamesHForrest ,

Great Book

This book is a prescriptive tutorial on using Kali Linux, which has quickly become a white hat favorite when it comes to penetration testing toolkits. The authors do a great job a brain dumping practically all of their knowledge into this easy to read and informative book. It is packed with pragmatic, forward thinking, astute information that is the stuff of engineering epiphany.

I highly recommend this book and can also say that the authors are the real deal having spent many years performing threat research.

Must read for security pros.

BigTLove ,

Network and web security

The book goes into detail for network and web security. It teaches how to perform audits on your network and test them for vulnerability. The author, Aamir Lakhani (Dr. Chaos) and Joseph Muniz combine real world situations on how to secure web servers and problems that exist in real world web applications. Lastly, they show you how to take your findings and write reports that meaningful based on those findings.

BackTrack 4: Assuring Security by Penetration Testing BackTrack 4: Assuring Security by Penetration Testing
2011년
Kali Linux – Assuring Security by Penetration Testing Kali Linux – Assuring Security by Penetration Testing
2014년
Ethical Hacking and Penetration, Step by Step with Kali Linux Ethical Hacking and Penetration, Step by Step with Kali Linux
2014년
Kali Linux – Hacking Tools Introduction Kali Linux – Hacking Tools Introduction
2016년
The Basics of Hacking and Penetration Testing The Basics of Hacking and Penetration Testing
2013년
CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002) CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002)
2022년
Security Operations Center Security Operations Center
2015년
Penetration Testing with Raspberry Pi Penetration Testing with Raspberry Pi
2015년
Modern Security Operations Center, The Modern Security Operations Center, The
2021년
Investigating the Cyber Breach Investigating the Cyber Breach
2018년
Kali Linux. Testy penetracyjne Kali Linux. Testy penetracyjne
2014년
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
2021년