- Kali Linux 2018:Windows Penetration Testing
- Wolf Halton Bo Weaver
- 477字
- 2021-06-24 18:22:34
Sharpening the Saw
A craftsman is only as good as his tools and tools need to be set up and maintained. Since you have an idea of what Kali Linux distro you are interested in installing, this chapter will help you set up and configure your personal versions of the platform. Kali Linux is versatile and can be used in several use cases.
When you first decided to use Kali Linux, you probably hadn't thought about the various common and uncommon uses. This chapter introduces you to ups that will work best for your Windows penetration testing requirements, the documentation tools that we use to make sure that the results of the tests are prepared and presented properly, and the details of Linux services that you need to operate these tools. Many books, including the first book Wolf Halton wrote about penetration testing, set its chapters in the order of the sub-menus in the Kali Security desktop. We found this to be less than intuitive. We have put all the setup at the beginning to reduce confusion for first-time Kali users, and because some things, such as the documentation tools, must be understood before you start using the other tools. The reason why the title of this chapter is Sharpening the Saw is because a poor workman, or an inexperienced hacker, blames his tools, a skilled craftsman spends a bit more time preparing tools so their work goes faster.
In the Kali Gnome3 Desktop Menu, there is a sub-menu called Favorites, and on your first run these tools will be the tools that the creators of Kali Linux believe to be the most indispensable weapons for a working security analyst to understand. In this chapter, after installation and setup, we are going to show you the tools we use most. These may become your favorites. The following screenshot shows the Favorites menu at default. The defaults are as follows:
- Firefox ESR: A web browser
- Terminal: A Bash Terminal emulator
- Files: A file manager similar to Windows Explorer.exe
- metasploit framework: the gold standard of exploit frameworks
- armitage: A GUI front-end for metasploit
- burpsuite: A web-application attack proxy
- beef xss framework: A cross-site scripting tool
- faraday IDE: A multi-user pen testing environment with over 70 supported tools including Metasploit, Burpsuite, Terminal, and many others
- Leafpad: Text editing application
Many system services on Kali Linux are the same as those on Ubuntu and other Linux servers based upon the Debian platform, but because there are security tools that use a client/server model, there are services that will need to have their servers started early to run your tests successfully.
We will learn the following topics in this chapter
- Installing Kali Linux to an encrypted USB drive
- Running Kali from the Live DVD
- Installing and configuring applications
- Setting up and configuring OpenVAS
- Reporting tests
- Running services on Kali Linux
- 大學計算機應用基礎實踐教程(Windows 7+Office 2013)
- 嵌入式應用程序設計綜合教程(微課版)
- Linux集群和自動化運維
- Linux網(wǎng)絡內(nèi)核分析與開發(fā)
- 網(wǎng)絡操作系統(tǒng)教程:Windows Server 2016管理與配置
- 寫給架構師的Linux實踐:設計并實現(xiàn)基于Linux的IT解決方案
- Cassandra 3.x High Availability(Second Edition)
- Raspberry Pi入門指南
- 電腦辦公(Windows 7+Office 2016)入門與提高
- Python機器學習系統(tǒng)構建(原書第3版)
- 操作系統(tǒng)實用教程
- Hyper-V Replica Essentials
- 鴻蒙操作系統(tǒng)開發(fā)入門經(jīng)典
- Red Hat Enterprise Linux 6.0系統(tǒng)管理
- 自研操作系統(tǒng):DIM-SUM設計與實現(xiàn)