Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to virtualization and VirtualBox, networking terminologies, and common Linux commands, followed by the step-by-step procedure to build your own web server. When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments.
After an introduction to Kali Linux, you will write your first penetration tests with Python and code raw binary packets for use in those tests. Along the way you will learn effective ways to collect important information and take a look at the five phases of penetration testing.
After taking you through SQL mapping and vulnerability analysis the book will explain the information assurance model and Metasploit, taking you through important commands and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic encryption techniques where you will work with the conventional cryptosystem and using symmetric cyphers.
What You Will Learn
- Master common Linux commands and networking techniques
- Build your own web server
- Carry out penetration testing using Python
- Detect sniffing attacks and SQL injection
- Use Metasploit with Kali Linux
Who This Book Is For
Developers new to ethical hacking with a basic understanding of Linux programming.