Kali NetHunter was originally created for Google Nexus devices such as the Nexus 4 and Nexus 5 smartphones and the Nexus 7 and Nexus 10 tablets. It was later expanded to the OnePlus One smartphone, which Offensive Security stated is the preferred phone form factor NetHunter device. As of this writing, Kali NetHunter is supported on a variety of devices from various manufacturers, such as Google, OnePlus, Samsung, LG, HTC, and Sony. Let's look at how to install Kali NetHunter on an Android device (before installing Kali NetHunter on your device, whether it’s a smartphone or tablet, please check the list of supported devices at https://www.offensive-security.com/kali-linux-nethunter-download/ or the list of supported devices and ROMs at the Offensive Security Kali NetHunter GitHub repository at https://github.com/offensive-security/kali...

Hands-On Penetration Testing with Kali NetHunter
By :

Hands-On Penetration Testing with Kali NetHunter
By:
Overview of this book
Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure.
Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem.
By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
Table of Contents (17 chapters)
Preface
Introduction to Kali NetHunter
Understanding the Phases of the Pentesting Process
Section 2: Common Pentesting Tasks and Tools
Intelligence-Gathering Tools
Scanning and Enumeration Tools
Penetrating the Target
Clearing Tracks and Removing Evidence from a Target
Section 3: Advanced Pentesting Tasks and Tools
Packet Sniffing and Traffic Analysis
Targeting Wireless Devices and Networks
Avoiding Detection
Hardening Techniques and Countermeasures
Building a Lab
Selecting a Kali Device and Hardware
Other Books You May Enjoy
How would like to rate this book
Customer Reviews