Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux
Ebook607 pages4 hours

Web Penetration Testing with Kali Linux

Rating: 5 out of 5 stars

5/5

()

Read preview

About this ebook

In Detail

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.

Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.

"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.

You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.

On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.

Approach

"Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.

Who this book is for

"Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.

LanguageEnglish
Release dateSep 25, 2013
ISBN9781782163176
Web Penetration Testing with Kali Linux
Author

Joseph Muniz

Joseph Muniz is a technical solutions architect and security researcher.. He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal networks.Joseph runs the http://TheSecurityBlogger.com website, a popular resources regarding security and product implementation. You can also find Joseph speaking at live events as well as involved with other publications. Recent events include being a speaker for "Social Media Deception" at the 2013 ASIS International conference, speaker for "Eliminate Network Blind Spots with Data Center Security" webinar, speaker for "Making Bring Your Own Device (BYOD) Work" at the Government Solutions Forum, Washington DC and an article on "Compromising Passwords in PenTest Magazine - Backtrack" Compendium, July 2013. Outside of work, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.

Related authors

Related to Web Penetration Testing with Kali Linux

Related ebooks

System Administration For You

View More

Related articles

Reviews for Web Penetration Testing with Kali Linux

Rating: 4.875 out of 5 stars
5/5

8 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Web Penetration Testing with Kali Linux - Joseph Muniz

    Z ^book_preview_excerpt.html}rȵtթsKlE3-j'jM-A8y(y"xv~$c}].ߺtW\z}QnfMQ{Y3+ۦ?4+][Wkk[ԝ'Y=xfVT6;^Vڨ^ :\[kpNnf1M\>~ޔjeN')j"Up5o>u-xRpztĎ/+Ɉiz-ݎ;m\ cR^b7`WkleC|[Y]MQKZׂ68rkS{$BV: R5bOϧ{77uSYef``+S꾾!M]V{,i2*χudڔ?tu*^r_pk]ḼYŘ/2svY[<+DgsmlBj( g$5^sKɕÎWMQLH#TΈR;(cguJKH/暈U Ҙh gؖ乮e Yt[|6Imo͠PDxd=Rug& iўkdxEWfENK"$& R'WgWjhM)t;M"cy-o$ɛwW#]b[$uEeяnJ*mp.HV["\ k>ڏPa0Cs6__WcI Cl$/we6ɺ6vq?\)Ҏ;sfxg\V.׃ AbvEz) m8rJ"%y&긮\7K zsz7\Z?.+w$/f5h./>|FCA}yܨw/rMsDP# hO6Gbz7ߤ qOmuB :Dy7 gUt%1 tp?u!.- uqd#p4͆enA2М #Tf/^ ˱Sx|sV( q⛩e4E˦XYCf,xqM` 7O- FD"Pym}X 2=!E_p5GR"Ё(*b!D$UIDF'[Ώp@ =g"ݦ/'AXk&DsI>9zlFK&k4ÓgJimGhT/t5xr:IH3[>AOz8 rzrywܤ.HTA'("ҹAPeļy;) r-q8|x~3r\[,Gz60!BAS7Bώ;:. A晻\eGE &;S1M@N?gdu-R$~NSc$zvyeLs}?%˾4d*'kT#ǁ 7Tʣ w:!$@ 4I ᳡\ݏGuQJGn:;UE;5ŭģh! 0>F30c@Lc[إ ypp2)~۶>qnߢB2:hz%&C+y:JrGz] \'vb; l.J]a, rn8D2$+M6ld705 :RUāi13iRfvLHkCJ]XI"-!4dGI ogo报N4SQiAŵ &qq>ԚTJ`=%&co#*FpgL>a>JD[8]**Q@eImp໌4\AU>_|NNJ}:CHɕy_PcLŲ2ڞV:?S~tI昰؂n5*D73]w Dwe`H%}3E轮trSպV_?#/EfZXo>LqWϥ/Sё"ĜӘ+L:Qg!BE DD҅m]Vņ9ZlOVckYYBB XSr{ٕ&ܣ ChA Y_WaISYCBZ2 ):Y?=H7d\6,0HkM$1qK"E#DŽTB^}C Nཻ3nM6%y{Elw""eg1:o1x]Rfa5P$\+ r=^AMi刁Iu#]kC}X*7X5f&[ۋ2ܨTP6R\;DAb??=+<և:=e2^~ByM>Ē(VkD'՟?xKߟ6%%6X0zƅDts'p74Gܸ0F67Xه2zCptw/GMVMa;ltn+A߬I 680NJPz#([Kφv3hӆus}sO -^1# {MsPO&63SoMb 2;S(87 Jqw<|}ִNGlD0dHߩs:|< I=8c0#Y!D?YmiMzЏ ߊ8ٺBn 9ρ6dU~4ōEhGeD9AܬxG?Jr"njn(Qoϟa{-qz*nnKԡDM >%Jnk0y ަ"B2f&$B,kbd9)^!ࡅ8pUj,c:뉕SV$P;El5ȝrg0.n /+' ZݒBxUWmq2L=@x*b34J*EE([儷¨o_6m&CݯZ8YK8j Ak3{=jEjt' +W{^:2o"7h 뚀Q/ CwD3\[ `I֐%B9WП1 C_1Ifd6c*'4/]|`&o,[=ع] D㟜xX;H$(w4~ kL]|/źl#]fdq\o0Nq">džPl((hj.$&]¬AP 1QdpQ}% "%;:,H!]9lȍKā,)J+~rIݨdS%qAW^h466J(oϬ!ן7/Su&F0:(#}FjQ g#ad.j'jGJEi:ѹ4> º5X Mph%"%uIp5%Ki%+c3nh76fBm}A´QjN'maW>k)n\F||35hŪDа,wVߢ&:*æiX[]-7r8hnk&K9) bTҽdkz q Qk[˾8Ees˸:i4,c93i}m:5w04MeŃ<&Ý33Hh_M X_ҙqOͪb]0/Ᏺ=+7HmLdrhS i B⺍ms-` `YW\+Ict `z %qp8E)%=^1Ոzr|y^(N[;SAv=B*FoO$">FDB 'QZ>,8*%?oΛ\ >E!#SwnŠfA/[ @!#a{|gM>oxլޒsw"dI<4W& _3gDWּ:"D0q%LN" iA¥+ճ__?j|wu{JRlJְ}1<=BgfH]+=%VĎI+7@2S'"XW.cOCr_iikؘt!!֭gf5YHnܕi\-ِ窮d|li9|@< iʬ qSA@oӶ7* i-{9> kk1 Z::d,٥۾!1}tLiQU-NSφt"`M6$Y 5A .+0ˋ>V9oꄸP=Aj]~ %o>\V#6 li^Ƅ!jI8\ FaVD7H$@PpI-4DL&[#׋/Ѯ 4/lZ$m|./z{}dմ;Qkr)HC9<˫ t <xu&b 0L3M+$*fCKIqywbhj/6\z.YVt\O+g-ՋFM[\ѦYh|\lH/U7)sstbu%ژGG7@m'!rx <kZ"A >roj} H3\ċ>t ^ހag:Aw!\[Kc?N}`8p?;5!_WF0Uut&ўJX 80B`+vETA%0pq$y;}M Dj >pt!\ZMLlvF|ɶfQ:B)5K5 qoRλ[2, Ec4C;5BmhPdb^y'ۻVq`EB_l۞i{zZQ[`{/ ./CH]mAk ;!W}GBGN`W~ L#%OmY5]ӶB$o_VGZqd.O`SP"}@1EŁ}RE/J̴wG%2󎽚θjD'3B~ک}%hn;->L2 9نCskr. N=oH7=`BB&4B (x)b#շYT!lC̮OhqɅ6/gJ ,(m*ꈠ1M: >d26._a"+|x+r{ࡏ ڸtQ\1z>w4K"tі/ 3 ;#NwWr҉M\>?C$(+_\}ggg۔l4FpuV[k`(b 1#Op!0t!E3Nˆ" %>D+MR:(ʒ59➽['7xk8-׳׋}bm{fUK3)4ھ =]%LlI\ȼ5^ c1yqCǑ!V>d%LAm7.7j_1{{1U#$!D\ 0jݹ qn,aΏߐwowsluM(dEa-I¡u* ΟA<Mm|)QDQL$ 7 ccЛ󛉴/xIĮ%9Pͭv L2(Yyoco13d RPϨ26`vpH@]a'55yg&8 b5s+0 bmd.I4!1vYNܗz 8xwZ-Jԫ=Xbd2K%p3q" (,8k戝Q+`dZn\^|jm@SP ۚ n߾ b8[A >IW߽3R`?y;x ٯ>|Y IknMVGRt¢"XLM$80fȄup=a NEΡe Apa٨qv1S׽J Z?ˬLxb_Ups$JW ZZƓ@n.R(GCU&ƒ_fef']]R2)a%J#qu"n1\JF@ΘZ~wF,l8$DH/ c#S8˻GS p ;GJ~c1!hZpcٜ 퓏cta{–,ty+2O:)c #C{UDiJ3Lyi-{vzDR''WyL0UYf bqWlL }ر:qy?j$٧ժAS(1kf@-=`MF\]WO@11!| #T炟HpO.Xp"tƂNIkY. |"\Y,t <@ oKDq^'b!- we8A<(Skߖ۱C+c%eF|[VJE"Q4"!'|VFd|^|쯞QIkKgBO9 ߊC( 4=Y齪 DŽEA¾8n"F{ӮP0RΖB&1R˸ޘ u|7[./cbx˱|#)! 5Е{Ĺ,xU6w5Q}brFn~eȇeQQ m3 ^Zo. D\0Y:8sP&RKL%c]%WUl(QNl 6:m 7{(Grgqҧpn*q\!=>5k吖8d !~qy`4 fAy76Z+=-Y#o[1Яcw;Kz q Z{sL0!,%r=B λjvIXmW(/#CF  aU,/aOV'@/qߠ|+NKIշ\=RUZ gF\{ΰW@xpc/,ׁqzLi ;&*+I:"iQl]0 r}{#SQ}(F:G~ȿ7jZ$+/Q}$1MË׭)L7OhlNFJ㫐=!Hɍg{A2ܴ\Œ؎+w5yJ+ybN mQb65PkxQ Fvҷ|ǷRGJ.B+~9k!w>-}, I8(ⱅC'ڛ֋'M0U4R26nE]iPƂ/_)}&Ie;WS Ӽ ,Z wglf/Ɨ:A;4>e.W T{kZGf#Æ2'oJ"j*ZFx0B|@@K]vqw>,R` Y|Q)$ Yg!ܴG0XC7lQ~UL՗Xm6PRk2>C'| eܥꭿ>p3lnFJ1g(VLɻJj 2 -p9Viy:1#Z4TMB>M~,.{]ܲe'Z{ #*&?KQ4Ad>*9{-^7~
    Enjoying the preview?
    Page 1 of 1