Modul Praktek - Beginning With Kali Linux
Modul Praktek - Beginning With Kali Linux
Prepared by
Syahmuddin Alfaritsi
CONTENTS
02
A Brief History of Kali
03
A brief history of Kali
4
A brief history of Kali
4
The Penetration Tools
Categorized
03
The Penetration Tools Categorized
• Information gathering:
This category contains several tools that can be used to gather
information about DNS, IDS/IPS, network scanning, operating
systems, routing, SSL, SMB, VPN, voice over IP, SNMP, e-mail
addresses, and VPN.
4
The Penetration Tools Categorized
• Vulnerability assessment:
In this category, you can find tools to scan vulnerabilities in
general. It also contains tools to assess the Cisco network, and
tools to assess vulnerability in several database servers. This
category also includes several fuzzing tools.
• Web applications:
This category contains tools related to web applications such
as the content management system scanner, database
exploitation, web application fuzzers, web application proxies,
web crawlers, and web vulnerability scanners.
4
The Penetration Tools Categorized
• Password attacks:
In this category, you will find several tools that can be used to
perform password attacks, online or offline.
• Exploitation tools:
This category contains tools that can be used to exploit the
vulnerabilities found in the target environment. You can find
exploitation tools for the network, Web, and database. There
are also tools to perform social engineering attacks and find
out about the exploit information.
4
The Penetration Tools Categorized
• Maintaining access:
Tools in this category will be able to help you maintain access
to the target machine. You might need to get the highest
privilege level in the machine before you can install tools in
this category. Here, you can find tools for backdooring the
operating system and web application. You can also find tools
for tunneling.
4
The Penetration Tools Categorized
• Reporting tools:
In this category, you will find tools that help you document the
penetration-testing process and results.
• System services:
This category contains several services that can be useful
during the penetration testing task, such as the Apache
service, MySQL service, SSH service, and Metasploit service.
4
10 Security Tools and
Others
03
10 Security Tools and Others
4
10 Security Tools and Others
Metasploit
Nmap
Sqlmap
Wireshark
zaproxy.
• Wireless attacks:
This category includes tools to attack Bluetooth, RFID/ NFC,
and wireless devices.
4
10 Security Tools and Others
• Reverse engineering:
This category contains tools that can be used to debug a
program or disassemble an executable file.
• Stress testing:
This category contains tools that can be used to help you in
stress testing your network, wireless, Web, and VOIP
environment.
• Hardware hacking:
Tools in this category can be used if you want to work with
Android and Arduino applications.
4
10 Security Tools and Others
• Forensics:
In this category, you will find several tools that can be used for
digital forensics, such as acquiring a hard disk image, carving
files, and analyzing the hard disk image. To use the forensics
capabilities in Kali Linux properly, you need to navigate to Kali
Linux Forensics | No Drives or Swap Mount in the booting
menu. With this option, Kali Linux will not mount the drives
automatically, so it will preserve the drives' integrity.
4
Information Gathering
03
Information Gathering
4
Information Gathering
4
Information Gathering
Information Gathering
For this chapter, we will utilize the passive and active methods
of information gathering to get a better picture of the target.
We will discuss the following topics in this chapter:
4
Information Gathering
4
Information Gathering
4
Information Gathering
4
Information Gathering
4
Information Gathering
4
Information Gathering
URL Description
Due to the ease of use, you only need an Internet connection and a
web browser, we suggest that you utilize these public resources first
before using the tools provided with Kali Linux.
If you want to know how The Kali Linux , please read manual book of
Kali Linux and practice wisely
4
Have A Nice Day with Kali Linux
03