Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf

所需积分/C币:50 2017-09-27 09:57:44 26.32MB PDF
54
收藏 收藏
举报

Kali Linux Revealed Mastering the Penetration Testing Distribution 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
Kali linux Reⅴ ealed Mastering the Penetration Testing Distribution by Raphael hertzog, Jim O'Gorman and Mati aharoni 0 OFFSEC PRESS Kali linux Revealed Copyright O 2017 Raphael Hertzog, Jim O'Gorman, and Mati aharoni This book is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License http://creativecommons.org/licenses/by-sa/3.0/ Some sections of this book borrow content from the"Debian Administrator's Handbook, Debian Jessie from Discovery to Mastery""written by Raphael Hertzog and roland Mas, which is available here https://debian-handbook.info/browse/stable/ For the purpose of the CC-BY-SA license, Kali Linux Revealed is an Adaptation of the Debian Administrator's Handbook Kali Linux " is a trademark of offensive Security any use or distribution of this book, modified or not, must comply with the trademark policy defined here https://www.kali.org/trademark-policy/ All Rights Not Explicitly Granted Above Are Reserved ISBN:978-0-9976156-0-9(paperback) offsec press 19701 Bethel church road #103-253 Cornelius nc 28031 USA Www.offensive-security.com Library of Congress Control Number: 2017905895 The information in this book is distributed on an"As Is"basis, without warranty. While every precaution nas been taken in the preparation of this work, neither the authors nor offsec Press shall have any liabil ity to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it Because of the dynamic nature of the Internet, any Web addresses or links contained in this book may have changed since publication and may no longer be valid Printed in the united states of america Table of contents 1. About kali linux 1.1 A Bit of History 1.2 Relationship with Debian 4 1.2.1 The flow of pack 4 1.2.2 Managing the Difference with Debian ...,...,........,....,...,.... 1.3 Purpose and Use cases 1.4 Main Kali linux Features 1.4.1 A Live system 1.4.2 Forensics Mode 1.4.3A Custom linux Kernel 8889 1.4.4 Completely Customizable 1.4.5 A Trustable Operating System 1.4.6 Usable on a wide range of arm devices 999 1.5 Kali linux policies 1.5.1 Single Root User by Default 10 1.5.2 Network Services Disabled by default 10 1.5.3 A Curated Collection of Applications 10 1.6 Summary 11 2. Getting Started with Kali Linux 13 2. 1 Downloading a Kali iso Image 14 2.1.1 Where to download 14 2.1.2 What to download,,,,,,,,,,,,,,,,,,, 14 2.1.3 Verifying Integrity and Authenticity 16 Relying on the TLS-Protected Website 17 Relying on PGP's Web of trust ........ 17 2.1.4 Copying the Image on a DVD-ROM or USB Key ,,,.,.,..,.,,,,., 19 Creating a Bootable Kali USB Drive on Windows 19 Creating a bootable Kali USB Drive on Linux ...............................20 Creating a Bootable Kali USB Drive on OS X/macOS 2.2 Booting a Kali Iso Image in Live Mode ................ 24 2.2.1 On a Real computer 24 2.2.2 In a virtual machine ,,,,,,,,,,,,24 Preliminary remarks 25 Virtualbox 26 VMware 36 2.3 Summary 43 3. Linux Fundamentals 47 3. 1 What Is Linux and What ls It Doing? 48 3.1.1 Driving Hardware 48 3.1.2 Unifying File Systems 49 3.1.3 Managing processes ,,50 3.1.4 Rights Management 51 3.2 The command line,,,,,,,,,,,,,,,,,,,,,,,, 51 3.2. 1 How To get a Command line 51 3.2.2 Command Line Basics: Browsing the Directory Tree and managing File 52 3.3 The File System 54 3.3. 1 The Filesystem Hierarchy Standard 54 3.3.2 The User's Home Directory 55 4 Useful commands 56 3.4. 1 Displaying and Modifying Text Files ,56 3.4.2 Searching for files and within file 56 3.4.3 Managing Processes 57 3.4.4M Rights 57 3.4.5 Getting System Information and logs 60 3.4.6 Discovering the Hardware 61 3.5 Summary 62 4. Installing Kali Linux 4.1 Minimal Installation Requirements ,,,,,,,,,,,66 4.2 Step by Step Installation on a Hard Drive 66 4.2.1 Plain Installation 66 Booting and Starting the installer Selecting the language 68 ntry 69 Selecting the Keyboard layout . 70 Detecting Hardware ,70 Loading Components 70 Detecting Network hardware ,,,,,,,71 figuring the Network 71 Root password 72 Configuring the Clock 73 Detecting Disks and other devices 74 Partitioning ,,,,,,,,,,,74 Copying the Live Image ,,,,,,,,,,,,,,,,80 Configuring the Package Manager 81 Installing the grub boot loader 83 inishing the Installation and Rebooting 85 4.2.2 Installation on a Fully Encrypted File System 85 Introduction to LVM ,,,86 Introduction to luks 86 Setting Up Encrypted Partitions 86 End of the Guided Partitioning with Encrypted LVM 90 4.3 Unattended Installations 91 4.3. 1 Preseeding Answers ···非非非·着鲁·鲁·非··非 92 With boot parameters 92 With a preseed file in the initrd 92 With a Preseed file in the boot medi 93 With a Preseed File loaded from the Network . ,93 4.3.2 Creating a Preseed File 93 4.4 ARM Installations 94 4.5 Troubleshooting Installations ................ 95 4.6 Summary 100 5. Configuring Kali Linux 103 5. 1 Configuring the Network 104 5.1. 1 On the Desktop with NetworkManager ,,104 5.1.2 On the Command Line with Ifupdown 105 5.1.3 On the Command Line with systemd- networkd 106 6. 2 Managing Unix Users and Unix Groups 107 5.2.1 Creating User Accounts 107 5.2.2 Modifying an Existing account or Password 108 52.3 Disabling an Account,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 109 5.2.4 Managing Unix Groups 109 5.3 Configuring Services ,,109 5.3. 1 Configuring a Specific Program 110 5.3.2 Configuring SSH for Remote Le 110 5.3.3 Configuring PostgreSQL Databases 111 Connection Type and Client Authentication ,,,111 Creating Users and Databases 112 Managing PostgresQL Clusters . 113 5.3.4 Configuring Apache ,.,..,,., 113 Configuring Virtual Hosts ,,,,,,,,,,,,114 Common directives 115 5.4 Managing Set 117 5.5 Summary ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,119 Table of conte 6. Helping Yourself and Getting Help 123 6. 1 Documentation sources ,,,,,,,,,,,,124 6.1.1 Manual pages ,124 6.1.2 Info documents 126 6.1.3 Package-Specific Documentation ,,,,,,126 6. 1. 4 Websites 127 6.1.5 Kali Documentation at docs. kali ,127 6.2 Kali Linux Communities 128 6.2. 1 Web Forums on forums. kali. org ,,,,,,,,,,,128 6.2.2#kali-linux IRC Channel on freenode ,,,,,,,,,,128 6.3 Filing a Good Bug report ··非非 ·着鲁着鲁·非··· ,129 6.3. 1 Generic Recommendations 130 How to communicate ,130 What to Put in the bug report ·· ,,,130 Miscellaneous tips,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ,131 6.3.2 Where to File a bug report 132 6.3. 3 How to File a bug report 133 Filing a Bug Report in Kali 133 Filing a Bug Report in Debian ...,.........,.,.,....... 137 Filing a Bug Report in another Free Software Project 144 64 Summary·: 146 7. Securing and Monitoring Kali Linux 149 7.1 Defining a Security Policy 150 7.2 Possible security measures 152 7.2.1 On a Server 152 n a Laptop 152 7.3 Securing Network Services 153 7.4 Firewall or Packet Filtering....................... 153 7.4.1 Netfilter Behavior..,,.... 154 7.4.2 Syntax of iptables and ip6tables ,,,,,,,,,,,157 Commands 157 Rule 157 7.4.3 Creating Rules 159 7.4.4 Installing the Rules at Each Boot 160 7.5 Monitoring and Logging 161 7.5. 1 Monitoring Logs with logcheck .,,.,....,...,...,..... 161 7.5.2 Monitoring Activity in Real Time ,,,,,,,,,,162 7.5.3 Detecting Changes 162 ing Packages with dpkg --verify 162 monitoring Files: AID 163 7.6 Summary ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,164 8. Debian Package management 169 8.1 Introduction to apt ,,,170 8.1.1 Relationship between APT and dpkg .,,....,.,,....,.,,..... 170 8.1.2 Understanding the sources. list file 172 8.1.3 Kali Repositories 173 The Kali-Rolling Repository 173 The Kali-Dev Repository ,,,,,,,,,,,,174 The Kali-Bleeding-Edge Repository . 174 The kali Linux Mirrors 174 8.2 Basic Package Interaction 175 8.2.1 Initial 176 8.2.2 Installing Package 176 Installing packages with dp 176 Installing Packages with APT 177 2.3 Upgrading Kali Linux 179 8.2.4 Removing and Purging Packages ,180 8.2.5 Inspecting Pa 181 uerying dpkg's Database and Inspecting. deb Files 181 Querying the Database of Available Packages with ap he and apt 185 2.6 Troubleshooting 187 Handling Problems after an Upgrade ,187 dpkg Log file 188 Reinstalling Packages with apt --reinstall and aptitude reinstall 189 Leveraging-force-to Repair Broken Dependencie 189 8.2.7 Frontends: aptitude and synaptic 190 190 194 8. 3 Advanced APT Configuration and Usage 194 8.3.1 Configuring apt 195 8.3.2 Managing package priorities 196 8.3.3 Working with Several Distributions 198 8.3.4 Tracking Automatically Installed Packages ,,,,,,,,,,,199 8.3.5 Leveraging Multi-Arch Support ,,..,.,,....,,., 200 Enabling Multi-Arch 200 Multi-Arch Related Changes 201 8.3.6 Validating Package Authenticity ,,,,,,,,,,,,,,,,202 8.4 Package Reference: Digging deeper into the debian Package system ,,,,,,,,,,,204 8.4.1 The control file 206 207 Pre-Depends, a More demanding depends 207 Recommends, Suggests, and Enhances Fields................................ 208 Table of conte VII

...展开详情
试读 127P Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf
立即下载
限时抽奖 低至0.43元/次
身份认证后 购VIP低至7折
一个资源只可评论一次,评论内容不能少于5个字
您会向同学/朋友/同事推荐我们的CSDN下载吗?
谢谢参与!您的真实评价是我们改进的动力~
  • 至尊王者

关注 私信
上传资源赚钱or赚积分
最新推荐
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf 50积分/C币 立即下载
1/127
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第1页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第2页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第3页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第4页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第5页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第6页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第7页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第8页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第9页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第10页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第11页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第12页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第13页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第14页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第15页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第16页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第17页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第18页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第19页
Kali Linux Revealed Mastering the Penetration Testing Distribution 无水印pdf第20页

试读结束, 可继续阅读

50积分/C币 立即下载