Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Web Penetration Testing with Kali Linux
  • Toc
  • feedback
Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

4.1 (16)
close
Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

4.1 (16)

Overview of this book

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.
Table of Contents (15 chapters)
close
Web Penetration Testing with Kali Linux
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Documentation


Developing a deliverable can be broken into a few stages, as shown in the following diagram. The first stage is Project Review. This is where the service provider reviews the statement of work, customer business objectives, areas of concern, and proposed value to provide. All of this plus additional identified material is used to build a report template.

The next step is filling in the report template during the Information Collection stage. Information captured includes devices identified, processes used, vulnerabilities found, verification of vulnerabilities, suggested remediation, and other data.

Once all data is captured and aligned with the template, the third phase is preparing a First Draft. This draft will not be customer facing and contain as much data as possible. Last is the Review phase, used to slim down the report to the strongest data along with tuning to meet business demands in a professional manner. Best practice is having both a technical and professional writer...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete