更新时间:2021-06-24 18:23:06
coverpage
Title Page
Packt Upsell
Why subscribe?
Packt.com
Contributors
About the authors
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Disclaimer
Choosing Your Distro
Desktop environments
Desktop environment versus Window Manager
Enlightenment (E17)
E17 Window Manager issues
Gnome desktop
Gnome 3 desktop issues
KDE desktop
KDE issues
LXDE desktop
LXDE issues
MATE desktop
MATE issues
Xfce desktop
Xfce issues
Choosing your look and feel
Configuring Kali to be your Daily Driver
User account setup
Summary
Sharpening the Saw
Technical requirements
Installing Kali Linux to an encrypted USB drive
Prerequisites for installation
Booting up
Configuring the installation
Setting up the drive
Booting your new installation of Kali
Running Kali from the Live DVD
Installing and configuring applications
Gedit – the Gnome Text Editor
Geany – the platform-agnostic code IDE
Terminator – the Terminal emulator for multi-tasking
Etherape – the graphical protocol-analysis tool
Setting up and configuring OpenVAS
Reporting tests
KeepNote – stand-alone document organizer
Dradis – web-based document organizer
Running services on Kali Linux
Information Gathering and Vulnerability Assessments
Footprinting the network
Nmap
Zenmap
The difference verbosity makes
Scanning a network range
An annotated list of Nmap command options
Using OpenVAS
Using Maltego
Using KeepNote
Further reading
Sniffing and Spoofing
Sniffing and spoofing network traffic
Sniffing network traffic
tcpdump
WinDump (Windows tcpdump)
Wireshark
The packet
Working with Wireshark
Spoofing network traffic
Ettercap
Ettercap on the command line
Password Attacks
Password attack planning
Cracking the NTLM code (revisited)
Password lists
Cleaning a password list
My friend Johnny
John the Ripper (command line)
xHydra
NetBIOS Name Service and LLMNR - Obsolete but Still Deadly
NetBIOS name service and NTLM
Sniffing and capturing traffic
Using Ettercap data
NetBIOS scanning using NBTscan