Jump to content

Welcome to NulledBlog
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!
Photo

[E-Book] Kali Linux Network Scanning Cookbook


  • Please log in to reply
9 replies to this topic

#1
MetaRobot

  • Offline
  • Junkie

  • PipPipPipPipPipPip
  • Posts:
    266
    Reputation:
    90
    Joined:
    23 Aug, 2015

Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning

 

psgr9lK.jpg

 

Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. This immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them.

 

Download:

Hidden Content
You'll be able to see the hidden content once you reply to this topic.

 

TABLE OF CONTENT

(Title/Page)

 

Chapter 1: Getting Started 7
Configuring a security lab with VMware Player (Windows) 7
Configuring a security lab with VMware Fusion (Mac OS X) 13
Installing Ubuntu Server 16
Installing Metasploitable2 20
Installing Windows Server 22
Increasing the Windows attack surface 24
Installing Kali Linux 27
Configuring and using SSH 31
Installing Nessus on Kali Linux 35
Configuring Burp Suite on Kali Linux 39
Using text editors (VIM and Nano) 42

 

Chapter 2: Discovery Scanning 45
Using Scapy to perform layer 2 discovery 49
Using ARPing to perform layer 2 discovery 58
Using Nmap to perform layer 2 discovery 63
Using NetDiscover to perform layer 2 discovery 66
Using Metasploit to perform layer 2 discovery 69
Using ICMP ping to perform layer 3 discovery 73
Using Scapy to perform layer 3 discovery 78
Using Nmap to perform layer 3 discovery 87
Using fping to perform layer 3 discovery 90
Using hping3 to perform layer 3 discovery 94
Using Scapy to perform layer 4 discovery 100
Using Nmap to perform layer 4 discovery 111
Using hping3 to perform layer 4 discovery 115

 

Chapter 3: Port Scanning 125
UDP port scanning 126
TCP port scanning 126
UDP scanning with Scapy 129
UDP scanning with Nmap 136
UDP scanning with Metasploit 140
Stealth scanning with Scapy 145
Stealth scanning with Nmap 153
Stealth scanning with Metasploit 160
Stealth scanning with hping3 167
Connect scanning with Scapy 170
Connect scanning with Nmap 178
Connect scanning with Metasploit 184
Connect scanning with Dmitry 192
TCP port scanning with Netcat 195
Zombie scanning with Scapy 199
Zombie scanning with Nmap 204

 

Chapter 4: Fingerprinting 209
Banner grabbing with Netcat 211
Banner grabbing with Python sockets 213
Banner grabbing with Dmitry 217
Banner grabbing with Nmap NSE 220
Banner grabbing with Amap 221
Service identification with Nmap 224
Service identification with Amap 226
Operating system identification with Scapy 230
Operating system identification with Nmap 237
Operating system identification with xProbe2 238
Passive operating system identification with p0f 241
SNMP analysis with Onesixtyone 244
SNMP analysis with SNMPwalk 245
Firewall identification with Scapy 247
Firewall identification with Nmap 262
Firewall identification with Metasploit 264

 

Chapter 5: Vulnerability Scanning 269
Vulnerability scanning with Nmap Scripting Engine 270
Vulnerability scanning with MSF auxiliary modules 276
Creating scan policies with Nessus 280

Vulnerability scanning with Nessus 283
Command-line scanning with Nessuscmd 288
Validating vulnerabilities with HTTP interaction 291
Validating vulnerabilities with ICMP interaction 293

 

Chapter 6: Denial of Service 297
Fuzz testing to identify buffer overflows 298
Remote FTP service buffer overflow DoS 302
Smurf DoS attack 305
DNS amplification DoS attack 309
SNMP amplification DoS attack 320
NTP amplification DoS attack 330
SYN flood DoS attack 332
Sock stress DoS attack 339
DoS attacks with Nmap NSE 344
DoS attacks with Metasploit 348
DoS attacks with the exploit database 354

 

Chapter 7: Web Application Scanning 359
Web application scanning with Nikto 360
SSL/TLS scanning with SSLScan 363
SSL/TLS scanning with SSLyze 366
Defining a web application target with Burp Suite 369
Using Burp Suite Spider 371
Using Burp Suite engagement tools 373
Using Burp Suite Proxy 375
Using the Burp Suite web application scanner 376
Using Burp Suite Intruder 378
Using Burp Suite Comparer 381
Using Burp Suite Repeater 382
Using Burp Suite Decoder 386
Using Burp Suite Sequencer 387
GET method SQL injection with sqlmap 390
POST method SQL injection with sqlmap 394
Requesting a capture SQL injection with sqlmap 397
Automating CSRF testing 399
Validating command injection vulnerabilities with HTTP traffic 402
Validating command injection vulnerabilities with ICMP traffic 404

 

Chapter 8: Automating Kali Tools 407
Nmap greppable output analysis 407
Nmap port scanning with targeted NSE script execution 410
Nmap NSE vulnerability scanning with MSF exploitation 413
Nessuscmd vulnerability scanning with MSF exploitation 416
Multithreaded MSF exploitation with reverse shell payload 419
Multithreaded MSF exploitation with backdoor executable 422
Multithreaded MSF exploitation with ICMP verification 424
Multithreaded MSF exploitation with admin account creation 426

 

 

Have fun if anyone needs this and was looking for it! ^_^ +1 ;)


Edited by MetaRobot, 03 September 2015 - 06:38 PM.

  • 0

Vle1BgL.gif


#2
SithNull

  • Offline
  • h3ll0_w0rld

  • PipPip
  • Posts:
    17
    Reputation:
    0
    Joined:
    01 Sep, 2015

Is this just your typical scan for open ports with NMAP type of thing?


  • 0

Don't sniff drugs, sniff packets.


#3
MetaRobot

  • Offline
  • Junkie

  • PipPipPipPipPipPip
  • Posts:
    266
    Reputation:
    90
    Joined:
    23 Aug, 2015

Is this just your typical scan for open ports with NMAP type of thing?

i will update the thread iwth the table of content right now. it's a lot more than just nmap


  • 0

Vle1BgL.gif


#4
MetaRobot

  • Offline
  • Junkie

  • PipPipPipPipPipPip
  • Posts:
    266
    Reputation:
    90
    Joined:
    23 Aug, 2015

Updated Thread!


  • 0

Vle1BgL.gif


#5
nuker0x

  • Offline
  • New Member

  • PipPip
  • Posts:
    17
    Reputation:
    4
    Joined:
    03 Sep, 2015

Rebo xD


  • 0

#6
feelmyowned

  • Offline
  • Addicted

  • Posts:
    237
    Reputation:
    0
    Joined:
    13 Jul, 2015

Thanks :D


  • 0

#7
COCADA

  • Offline
  • Member

  • PipPipPip
  • Posts:
    33
    Reputation:
    31
    Joined:
    06 Sep, 2015

Thanks !!!!


  • 0

#8
yukti007

  • Offline
  • New Member

  • Posts:
    20
    Reputation:
    0
    Joined:
    13 Sep, 2015

thanks!


  • 0

#9
redhat089

  • Offline
  • Lurker

  • Posts:
    4
    Reputation:
    0
    Joined:
    22 Sep, 2015

never go sleeping before dessert


  • 0

#10
Handrij

  • Offline
  • Lurker

  • Posts:
    5
    Reputation:
    0
    Joined:
    23 Sep, 2015

I will download it


  • 0


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users