One of the distinct advantages to using the NetHunter platform is its size and the ability to be discreet. This is a useful advantage if you are tasked with testing the wireless security of a site while trying to maintain a level of covertness. Sitting in the lobby of a target location with your laptop open and external antenna attached may attract some unwanted attention. Rather, deploying NetHunter on a Nexus 5 phone and having a discrete external antenna hidden behind a newspaper or day planner is a better way to keep a low profile. Another key advantage of the NetHunter platform in conducting wireless penetration testing is the ability to cover a wider area, such as a campus environment, without having to cart around a large laptop.

Kali Linux 2018: Assuring Security by Penetration Testing
By :

Kali Linux 2018: Assuring Security by Penetration Testing
By:
Overview of this book
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement.
This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You’ll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you’ll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you’ll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You’ll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks.
By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings.
Table of Contents (17 chapters)
Preface
Installing and Configuring Kali Linux
Setting Up Your Test Lab
Penetration Testing Methodology
Footprinting and Information Gathering
Scanning and Evasion Techniques
Vulnerability Scanning
Social Engineering
Target Exploitation
Privilege Escalation and Maintaining Access
Web Application Testing
Wireless Penetration Testing
Mobile Penetration Testing with Kali NetHunter
PCI DSS Scanning and Penetration Testing
Tools for Penetration Testing Reporting
Assessments
Other Books You May Enjoy
How would like to rate this book
Customer Reviews