Hands-On Penetration Testing with Kali NetHunter
by Glen D. Singh & Sean-Philip Oriyano
LEAVE A LIKE. DON'T BE A LEECH.
LEAVE A LIKE. DON'T BE A LEECH.
Book Summary
Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go. Convert Android to a powerful pentesting platform.
Key Features
- Get up and running with Kali Linux NetHunter
- Connect your Android device and gain full control over Windows, OSX, or Linux devices
- Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data
Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure.
Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem.
By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
What you will Learn
- Choose and configure a hardware device to use Kali NetHunter
- Use various tools during pentests
- Understand NetHunter suite components
- Discover tips to effectively use a compact mobile platform
- Create your own Kali NetHunter-enabled device and configure it for optimal results
- Learn to scan and gather information from a target
- Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices
Author Bio
Glen D. Singh is an cybersecurity author and lecturer. His areas of expertise are cybersecurity operations, offensive security tactics, and enterprise networking. He holds a Master of Science (MSc) in Cyber Security and many industry certifications, including CEH, CHFI, PAWSP, and 3xCCNA (in CyberOps, Security, and Routing and Switching). Glen loves teaching, mentoring and sharing his wealth of knowledge and experience as an author. He has written many books that focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game-changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.
Sean-Philip Oriyano is a long-time security professional. Over the past 25 years, he has divided his time between performing security research, consulting, and delivering training in the fields of both general IT and cyber security. He is also a best-selling author with many years' experience in both digital and print media. Sean has published several books over the past decade and has expanded his reach further by appearing on TV and radio shows. Additionally, Sean is a chief warrant officer (CWO) and unit commander specializing in cyber security training, development, and strategy. As a CWO, he is recognized as an SME in his field and is frequently called upon to provide expertise, training, and mentoring wherever needed.
:: IF YOU DOWNLOAD THIS, PLEASE LEAVE A LIKE!
:: IF YOU FOUND IT USEFUL, PLEASE LEAVE A RATING!
- BIG THANKS!
Last edited: