Hands-On Penetration Testing with Kali NetHunter

Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

Nonfiction, Computers, Networking & Communications, Operating Systems, General Computing
Cover of the book Hands-On Penetration Testing with Kali NetHunter by Glen D. Singh, Sean-Philip Oriyano, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Glen D. Singh, Sean-Philip Oriyano ISBN: 9781788996686
Publisher: Packt Publishing Publication: February 28, 2019
Imprint: Packt Publishing Language: English
Author: Glen D. Singh, Sean-Philip Oriyano
ISBN: 9781788996686
Publisher: Packt Publishing
Publication: February 28, 2019
Imprint: Packt Publishing
Language: English

Convert Android to a powerful pentesting platform.

Key Features

  • Get up and running with Kali Linux NetHunter
  • Connect your Android device and gain full control over Windows, OSX, or Linux devices
  • Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data

Book Description

Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure.

Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem.

By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.

What you will learn

  • Choose and configure a hardware device to use Kali NetHunter
  • Use various tools during pentests
  • Understand NetHunter suite components
  • Discover tips to effectively use a compact mobile platform
  • Create your own Kali NetHunter-enabled device and configure it for optimal results
  • Learn to scan and gather information from a target
  • Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices

Who this book is for

Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Convert Android to a powerful pentesting platform.

Key Features

Book Description

Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure.

Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem.

By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.

What you will learn

Who this book is for

Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.

More books from Packt Publishing

Cover of the book Alfresco 3 Web Content Management by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Twilio Cookbook by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Mastering R for Quantitative Finance by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Learning Google Apps Script by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Microsoft SharePoint 2010 Power User Cookbook: SharePoint Applied by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Enterprise API Management by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Dart: Scalable Application Development by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Salesforce CRM — The Definitive Admin Handbook - Third Edition by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Puppet Cookbook - Third Edition by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Learning DHTMLX Suite UI by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Clojure High Performance Programming by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Hands-On Web Penetration Testing with Metasploit by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Building Web Apps with Spring 5 and Angular by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Zabbix Performance Tuning by Glen D. Singh, Sean-Philip Oriyano
Cover of the book Learning Apex Programming by Glen D. Singh, Sean-Philip Oriyano
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy