Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python. Turn Kali Linux into your fighter cockpit. Key Features * Map your client's attack surface with Kali Linux * Discover the art of shellcode injection and managing multiple compromises in the environment * Understand how both the attackers and the defenders think Book Description Let's be honest: security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. In this book, you'll learn advanced techniques to attack Windows and Linux environments from the indispensable platform, Kali Linux. We'll work through core network hacking concepts and advanced exploitation techniques that leverage both technical and human factors to maximize success. We'll explore how to leverage public resources to learn more about your target, discover potential targets and analyze them, and gain footholds using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. We'll look at leveraging target resources, like PowerShell, to execute powerful and difficult-to-detect attacks. Along the way, we'll examine how these methods work in a fun-to-read way - so that you walk away with the necessary understanding to explain your findings to clients from all backgrounds. We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation. What you will learn * Get to know advanced pentesting techniques with Kali Linux * Gain an understanding of Kali Linux tools and methods from behind the scenes * Understand the exploitation of Windows and Linux clients and servers * Understand advanced Windows concepts and protections, and how to bypass them using Kali and live-off-the-land methods * Get cozy with sophisticated attack frameworks like Metasploit and Empire * Understand how to generate and analyze shellcode * Build and tweak attack scripts and modules Who This Book Is For This book is for penetration testers, information technology professionals, cybersecurity professionals and students, and individuals breaking into the pentesting role after demonstrating an advanced skill in boot camps. Prior experience with Windows, Linux, and networking is necessary.
Book InformationISBN 9781801815123
Author Phil BramwellFormat Paperback
Page Count 480
Imprint Packt Publishing LimitedPublisher Packt Publishing Limited
Weight(grams) 75g