a collection of books released for Kali Linux, Kali Linux is one of the best known and most used Linux distributions for security testing, digital investigation and penetration testing. it has grown in popularity so quickly that it’s now seen as an essential part of every security expert (and hacker) toolkit.

it’s based on Debian GNU / Linux, which is one of the large and famous distributions of the open-source operating system. It is explicitly built with safety engineers in mind – it consists of more than 600 packages for penetration testing. It can easily be executed using a live CD or USB or used in virtual machines. Some security experts even speculate that the growing popularity of Kali Linux can be linked to the many amateur attacks that they oppose. The distribution is very easy to use, even by beginners and the large collection of applications has contributed to the outlaws to an extensive collection of hacking tutorials.

Kali Linux Wireless Penetration Testing Cookbook

Identify and assess vulnerabilities present in your wireless network, WiFi, and Bluetooth enabled devices to improve your wireless security Paperback

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes

Key Features

Expose wireless security threats through the eyes of an attacker,

Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,

Acquire and apply key wireless pentesting skills used by industry experts

Kali Linux Cookbook Second Edition

Effective penetration testing solutions

About This Book

Learn how to scan networks to find vulnerable computers and servers

Hack into devices to control them, steal their data, and make them yours

Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux

Who This Book Is For

If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux

What You Will Learn

Acquire the key skills of ethical hacking to perform penetration testing

Learn how to perform network reconnaissance

Discover vulnerabilities in hosts

Attack vulnerabilities to take control of workstations and servers

Understand password cracking to bypass security

Learn how to hack into wireless networks

Attack web and database servers to exfiltrate data

Obfuscate your command and control connections to avoid firewall and IPS detection

Mastering Kali Linux for Advanced Penetration Testing – Second Edition

Secure your network with Kali Linux – the ultimate white hat hackers’ toolkit

A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

Employ advanced pentesting techniques with Kali Linux to build highly-secured systems

Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches

Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

What You Will Learn

Select and configure the most effective tools from Kali Linux to test network security

Employ stealth to avoid detection in the network being tested

Recognize when stealth attacks are being used against your network

Exploit networks and data systems using wired and wireless networks as well as web services

Identify and download valuable data from target systems

Maintain access to compromised systems

Use social engineering to compromise the weakest part of the network the end users

Kali Linux Network Scanning Cookbook – Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

Learn the fundamentals behind commonly used scanning techniques

Deploy powerful scanning tools that are integrated into the Kali Linux testing platform

The practical recipes will help you automate menial tasks and build your own script library

What You Will Learn

Develop a network-testing environment to test scanning tools and techniques

Understand the principles of network-scanning tools by building scripts and tools

Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited

Perform comprehensive scans to identify listening on TCP and UDP sockets

Get started with different Kali desktop environments–KDE, MATE, LXDE, and Xfce

Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more

Evaluate DoS threats and learn how common DoS attacks are performed

Learn how to use Burp Suite to evaluate web applications

Mastering Kali Linux for Web Penetration Testing

The ultimate defense against complex organized threats and attacks

Master the art of exploiting advanced web penetration techniques with Kali Linux 2016.2

About This Book

Make the most out of advanced web pen-testing techniques using Kali Linux 2016.2

Explore how Stored (a.k.a. Persistent) XSS attacks work and how to take advantage of them

Learn to secure your application by performing advanced web based attacks.

Bypass internet security to traverse from the web to a private network.

What You Will Learn

Establish a fully-featured sandbox for test rehearsal and risk-free investigation of applications

Enlist open-source information to get a head-start on enumerating account credentials, mapping potential dependencies, and discovering unintended backdoors and exposed information

Map, scan, and spider web applications using nmap/zenmap, nikto, arachni, webscarab, w3af, and NetCat for more accurate characterization

Proxy web transactions through tools such as Burp Suite, OWASP’s ZAP tool, and Vega to uncover application weaknesses and manipulate responses

Deploy SQL injection, cross-site scripting, Java vulnerabilities, and overflow attacks using Burp Suite, websploit, and SQLMap to test application robustness

Evaluate and test identity, authentication, and authorization schemes and sniff out weak cryptography before the black hats do

Kali Linux Intrusion and Exploitation Cookbook

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments

About This Book

Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits

Improve your testing efficiency with the use of automated vulnerability scanners

Work through step-by-step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies

What You Will Learn