Index
A
- ACK scan module / How to do it…
- admin account creation
- multithreaded MSF exploitation, performing with / Multithreaded MSF exploitation with admin account creation, Getting ready, How to do it…, How it works…
- AF_INET argument
- about / How to do it…
- Amap
- about / Banner grabbing with Amap, Service identification with Amap
- used, for gathering service banners / Getting ready, How to do it…, How it works…
- used, for performing service identification / Service identification with Amap, How to do it…, How it works…
- ARPing
- about / Using ARPing to perform layer 2 discovery
- used, for performing layer 2 discovery / Getting ready, How to do it…
- ARP poisoning / How it works…
B
- backdoor executable
- multithreaded MSF exploitation, performing with / Getting ready, How to do it…, How it works…
- Brute Force application / How to do it…
- buffer overflows
- remote fuzz testing, performing based on / Getting ready, How to do it…, How it works…
- buffer overflows identification
- fuzz test, performing for / How to do it…
- Burp Suite
- configuring, on Kali Linux / Getting ready, How to do it…, How it works…
- about / How to do it…, Defining a web application target with Burp Suite
- web application target, defining with / Defining a web application target with Burp Suite, How to do it…, How it works…
- Burp Suite Comparer
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
- Burp Suite Decoder
- used, for performing web application analysis / Using Burp Suite Decoder, Getting ready, How to do it…
- Burp Suite engagement tools
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
- Search / How to do it…
- Find comments / How to do it…
- Find scripts / How to do it…
- Find references / How to do it…
- Analyze target / How to do it…
- Discover content / How to do it…
- Schedule task / How to do it…
- Simulate manual testing / How to do it…
- Burp Suite Intruder
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
- Burp Suite Proxy
- used, for performing web application analysis / Using Burp Suite Proxy, Getting ready, How it works…
- Burp Suite Repeater
- used, for performing web application analysis / Using Burp Suite Repeater, How to do it…, How it works…
- Burp Suite Scanner
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
- Burp Suite Sequencer
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
- Burp Suite Spider
- about / Using Burp Suite Spider
- used, for performing web application analysis / Getting ready, How to do it…, How it works…
C
- capture SQL injection
- requesting, with sqlmap / Getting ready, How it works…
- command-line interface (CLI)
- about / How to do it…
- command-line scan
- performing, Nessuscmd used / How to do it…, How it works…
- command injection vulnerabilities
- validating, with HTTP requests / Validating command injection vulnerabilities with HTTP traffic, Getting ready, How to do it…, How it works…
- validating, with ICMP traffic / Getting ready, How to do it…, How it works…
- configuration, Burp Suite
- on Kali Linux / Getting ready, How to do it…, How it works…
- configuration, security lab
- with VMware Player (Windows) / Configuring a security lab with VMware Player (Windows), How to do it…
- with VMware Fusion (Mac OS X) / Configuring a security lab with VMware Fusion (Mac OS X), How to do it…
- configuration, SSH / Getting ready, How to do it…, How it works…
- connect scanning
- about / TCP port scanning
- CRIME (Compression Ratio Info-leak Made Easy) / How to do it…
- CSRF
- about / Automating CSRF testing
- CSRF testing
- automating / Getting ready, How to do it…, How it works…
- cut function / How to do it…
- CVE
- about / How to do it…
- CVE (Common Vulnerabilities and Exposures) / How to do it…
- CVE-2006-2961 / How to do it…
D
- DDoS
- about / Smurf DoS attack
- Debian Package Manager (dpkg) tool / How to do it…
- display() function / How to do it…, How to do it…
- Dmitry
- about / Connect scanning with Dmitry, Banner grabbing with Dmitry
- used, for performing TCP connect scan / Getting ready, How to do it…, How it works…
- used, for gathering service banners / How to do it…, How it works…
- DNS
- about / DNS amplification DoS attack
- DNS amplification attack
- simulating / Getting ready, How to do it…, How it works…
- Domain Name System (DNS) / How to do it…, How to do it…
- DoS attacks
- performing, Nmap NSE used / Getting ready, How to do it…
- performing, Metasploit used / Getting ready, How to do it…, How it works…
- performing, exploit database used / Getting ready, How to do it…
E
- exploit database
- about / DoS attacks with the exploit database
- used, for performing DoS attacks / Getting ready, How to do it…
F
- firewall identification
- performing, Scapy used / Firewall identification with Scapy, How to do it…, How it works…
- performing, Nmap used / Firewall identification with Nmap, How to do it…
- performing, Metasploit used / Firewall identification with Metasploit, How to do it…, How it works…
- fping
- about / Getting ready
- used, for performing layer 3 discovery / Getting ready, How to do it..., How it works…
- fuzzing
- fuzz test
- performing, for buffer overflows identification / How to do it…
G
- GET method SQL injection
- performing, with sqlmap / Getting ready, How to do it…
- Grep
- about / How it works…
- greppable output analysis, Nmap / Getting ready, How to do it…
H
- Hping3
- about / Getting ready
- used, for performing TCP stealth scan / Getting ready, How to do it…, How it works…
- hping3
- about / Getting ready
- used, for performing layer 3 discovery / Getting ready, How to do it..., How it works…
- used, for performing layer 4 discovery / Using hping3 to perform layer 4 discovery, How to do it…, How it works…
- HTTP interaction
- vulnerabilities, validating with / Validating vulnerabilities with HTTP interaction, How to do it…, How it works…
- HTTP requests
- command injection vulnerabilities, validating with / Validating command injection vulnerabilities with HTTP traffic, Getting ready, How to do it…, How it works…
I
- ICMP interaction
- vulnerabilities, validating with / Validating vulnerabilities with ICMP interaction, How to do it…, How it works…
- ICMP ping
- used, for performing layer 3 discovery / Using ICMP ping to perform layer 3 discovery, How to do it..., How it works…
- ICMP traffic
- command injection vulnerabilities, validating with / Getting ready, How to do it…, How it works…
- ICMP verification
- multithreaded MSF exploitation, performing with / Getting ready, How to do it…, How it works…
- installation, Kali Linux / How to do it…, How it works…
- installation, Metasploitable2 / How to do it…
- installation, Nessus
- on Kali Linux / Getting ready, How to do it…, How it works…
- installation, Ubuntu Server / How to do it…, How it works…
- installation, Windows Server / Getting ready, How to do it…
- Internet Control Message Protocol (ICMP) / How to do it…
- Intrusion Detection Systems (IDS) / How to do it…
- Intrusion Prevention Systems (IPS) / How to do it…
K
- Kali Linux
- about / Installing Kali Linux
- URL, for downloading / Getting ready
- installing / How to do it…, How it works…
- Nessus, installing on / Getting ready, How to do it…, How it works…
- Burp Suite, configuring on / Getting ready, How to do it…, How it works…
L
- LANMAN API / How to do it…
- layer 2 discovery
- performing, Scapy used / Getting ready, How to do it…, How it works…
- performing, ARPing used / Getting ready, How to do it…
- performing, Nmap used / Getting ready, How to do it…
- performing, NetDiscover used / Getting ready, How to do it…, How it works…
- performing, Metasploit used / Getting ready, How to do it…, How it works…
- layer 3 discovery
- performing, ICMP ping used / Using ICMP ping to perform layer 3 discovery, How to do it..., How it works…
- performing, Scapy used / Getting ready, How to do it..., How it works…
- performing, Nmap used / Getting ready, How to do it..., How it works…
- performing, fping used / Getting ready, How to do it..., How it works…
- performing, hping3 used / Getting ready, How to do it..., How it works…
- layer 4 discovery
- performing, Scapy used / Getting ready, How to do it…
- performing, Nmap used / Getting ready, How to do it…, How it works…
- performing, hping3 used / Using hping3 to perform layer 4 discovery, How to do it…, How it works…
- Local Area Network (LAN)
- about / Getting ready
- ls command / How to do it…
M
- Man-in-the-Middle (MITM) / How to do it…
- Metasploit
- about / Using Metasploit to perform layer 2 discovery, UDP scanning with Metasploit
- used, for performing layer 2 discovery / Getting ready, How to do it…, How it works…
- used, for performing UDP scan / Getting ready, How to do it…, How it works…
- used, for performing TCP stealth scan / Getting ready, How to do it…, How it works…
- used, for performing TCP connect scan / Connect scanning with Metasploit, How to do it…, How it works…
- used, for performing firewall identification / Firewall identification with Metasploit, How to do it…, How it works…
- used, for performing DoS attacks / Getting ready, How to do it…, How it works…
- Metasploitable
- URL, for downloading / Getting ready
- Metasploitable2
- about / Installing Metasploitable2, Getting ready
- installing / How to do it…
- MSF auxiliary modules
- used, for performing vulnerability analysis / Vulnerability scanning with MSF auxiliary modules, How to do it…, How it works…
- MSFCLI
- about / How to do it…
- msfconsole command / How to do it…, How to do it…
- MSF exploitation
- Nmap NSE vulnerability scan, performing with / Nmap NSE vulnerability scanning with MSF exploitation, How to do it…, How it works…
- Nessuscmd vulnerability scan, performing with / Getting ready, How to do it…
- multithreaded MSF exploitation
- performing, with reverse shell payload / Multithreaded MSF exploitation with reverse shell payload, How to do it…, How it works…
- performing, with backdoor executable / Getting ready, How to do it…, How it works…
- performing, with ICMP verification / Multithreaded MSF exploitation with ICMP verification, How to do it…, How it works…
- performing, with admin account creation / Multithreaded MSF exploitation with admin account creation, Getting ready, How to do it…, How it works…
N
- Nano / Getting ready
- Nano text editor
- using / How to do it…
- Nessus
- about / Installing Nessus on Kali Linux, Creating scan policies with Nessus
- installing, on Kali Linux / Getting ready, How to do it…, How it works…
- URL, for activation code / Getting ready
- URL, for downloading installation package / How to do it…
- used, for creating scan policies / How to do it…
- used, for performing vulnerability analysis / Vulnerability scanning with Nessus, How to do it…, How it works…
- Nessuscmd
- about / Command-line scanning with Nessuscmd, Nessuscmd vulnerability scanning with MSF exploitation
- used, for performing command-line scan / How to do it…, How it works…
- working / How it works…
- Nessuscmd vulnerability scan
- performing, with MSF exploitation / Getting ready, How to do it…
- Netcat
- about / TCP port scanning with Netcat, Banner grabbing with Netcat, How it works…
- used, for performing TCP connect scan / Getting ready, How to do it…, How it works…
- used, for gathering service banners / How to do it…, How it works…
- NetDiscover
- about / Using NetDiscover to perform layer 2 discovery
- used, for performing layer 2 discovery / Getting ready, How to do it…, How it works…
- Network Address Translation (NAT) / How it works…
- Network Interface Card (NIC) / How to do it…
- Network Time Protocol (NTP) / How to do it…
- Nikto
- about / Web application scanning with Nikto
- used, for performing web application scan / Getting ready, How to do it…, How it works…
- Nmap
- about / Using Nmap to perform layer 2 discovery, Using Nmap to perform layer 3 discovery, UDP scanning with Nmap, Service identification with Nmap, Nmap greppable output analysis
- used, for performing layer 2 discovery / Getting ready, How to do it…
- used, for performing layer 3 discovery / Getting ready, How to do it..., How it works…
- used, for performing layer 4 discovery / Getting ready, How to do it…, How it works…
- used, for performing UDP scan / Getting ready, How to do it…, How it works…
- used, for performing TCP stealth scan / Getting ready, How to do it…, How it works…
- used, for performing TCP connect scan / Connect scanning with Nmap, How to do it…, How it works…
- used, for performing zombie scan / Getting ready, How to do it…, How it works…
- used, for performing service identification / Getting ready, How to do it…, How it works…
- used, for performing operating system identification / Operating system identification with Nmap, How to do it…
- used, for performing firewall identification / Firewall identification with Nmap, How to do it…
- greppable output analysis / Getting ready, How to do it…
- Nmap NSE
- about / Banner grabbing with Nmap NSE, Nmap port scanning with targeted NSE script execution
- used, for gathering service banners / Getting ready, How it works…
- used, for performing DoS attacks / Getting ready, How to do it…
- Nmap NSE vulnerability scan
- performing, with MSF exploitation / Nmap NSE vulnerability scanning with MSF exploitation, How to do it…, How it works…
- Nmap port scan
- performing, with targeted NSE script execution / Getting ready, How to do it…, How it works…
- NSE
- about / Vulnerability scanning with Nmap Scripting Engine
- used, for performing vulnerability analysis / Getting ready, How to do it…
- NTP
- about / NTP amplification DoS attack
- NTP amplification attack
- simulating / Getting ready, How it works…
O
- Onesixtyone
- about / SNMP analysis with Onesixtyone
- used, for performing SNMP analysis / Getting ready, How it works…
- open() function / How to do it…
- operating system identification
- performing, Scapy used / Operating system identification with Scapy, How to do it…, How it works…
- performing, Nmap used / Operating system identification with Nmap, How to do it…
- performing, xProbe2 used / Getting ready, How to do it…, How it works…
P
- p0f
- about / Passive operating system identification with p0f
- used, for performing passive operating system identification / Getting ready, How to do it…, How it works…
- passive operating system identification
- performing, p0f used / Getting ready, How to do it…, How it works…
- passive scanning
- about / How to do it…
- Ping
- about / How it works…
- POST method SQL injection
- performing, with sqlmap / Getting ready, How to do it…, How it works…
- PuTTY
- URL, for downloading / Getting ready
- Python
- used, for gathering service banners / Getting ready, How to do it…, How it works…
- about / How to do it…
R
- regular expressions
- URL / How to do it…
- remote fuzz testing
- performing, based on buffer overflow / Getting ready, How to do it…, How it works…
- reverse shell payload
- multithreaded MSF exploitation, performing with / Multithreaded MSF exploitation with reverse shell payload, How to do it…, How it works…
- run command / How to do it…
S
- scan policies
- creating, Nessus used / How to do it…
- Scapy
- about / Using Scapy to perform layer 2 discovery, Using Scapy to perform layer 3 discovery, UDP scanning with Scapy
- used, for performing layer 2 discovery / Getting ready, How to do it…, How it works…
- used, for performing layer 3 discovery / Getting ready, How to do it..., How it works…
- used, for performing layer 4 discovery / Getting ready, How to do it…
- used, for performing UDP scan / Getting ready, How to do it…, How it works…
- used, for performing TCP stealth scan / Getting ready, How to do it…, How it works…
- used, for performing TCP connect scan / Getting ready, How to do it…, How it works…
- used, for performing zombie scan / Zombie scanning with Scapy, How to do it…, How it works…
- used, for performing operating system identification / Operating system identification with Scapy, How to do it…, How it works…
- used, for performing firewall identification / Firewall identification with Scapy, How to do it…, How it works…
- used, for performing SYN flood DoS attack / Getting ready, How to do it…
- used, for performing sock stress DoS attack / Getting ready, How to do it…
- script.db file / How to do it…
- Secure Copy (SCP) / How it works…
- security lab
- configuring, with VMware Player (Windows) / Configuring a security lab with VMware Player (Windows), How to do it…
- configuring, with VMware Fusion (Mac OS X) / Configuring a security lab with VMware Fusion (Mac OS X), How to do it…
- send() function / How to do it…
- service banners
- gathering, Netcat used / How to do it…, How it works…
- gathering, Python used / Getting ready, How to do it…, How it works…
- gathering, Dmitry used / How to do it…, How it works…
- gathering, Nmap NSE used / Getting ready, How it works…
- gathering, Amap used / Getting ready, How to do it…, How it works…
- service identification
- performing, Nmap used / Getting ready, How to do it…, How it works…
- performing, Amap used / Service identification with Amap, How to do it…, How it works…
- Simple Network Management Protocol (SNMP) / How to do it…
- smurf DoS attack
- performing / Getting ready, How to do it…, How it works…
- SNMP amplification attack
- simulating / SNMP amplification DoS attack, How to do it…, How it works…
- SNMP analysis
- performing, Onesixtyone used / Getting ready, How it works…
- performing, SNMPwalk used / SNMP analysis with SNMPwalk, How to do it…, How it works…
- SNMPwalk
- about / SNMP analysis with SNMPwalk
- used, for performing SNMP analysis / SNMP analysis with SNMPwalk, How to do it…, How it works…
- sock stress DoS attack
- about / Sock stress DoS attack
- performing, Scapy used / Getting ready, How to do it…
- SOCK_STREAM argument
- about / How to do it…
- sqlmap
- GET method SQL injection, performing with / Getting ready, How to do it…
- POST method SQL injection, performing with / Getting ready, How to do it…, How it works…
- capture SQL injection, requesting with / Getting ready, How it works…
- SSH
- using / Getting ready, How to do it…, How it works…
- configuring / Getting ready, How to do it…, How it works…
- SSL/TLS scan
- performing, with SSLScan / How to do it…
- SSLScan
- about / SSL/TLS scanning with SSLScan
- used, for performing SSL/TLS scan / How to do it…
- SSL TLS scan
- performing, with SSLyze / How to do it…, How it works…
- SSLyze
- about / SSL/TLS scanning with SSLyze
- used, for performing SSL TLS scan / How to do it…, How it works…
- stealth scanning
- about / TCP port scanning
- SYN+ACK packet / TCP port scanning, SYN flood DoS attack
- SYN flood DoS attack
- performing, Scapy used / Getting ready, How to do it…
- SYN packet / TCP port scanning, SYN flood DoS attack
T
- targeted NSE script execution
- Nmap port scan, performing with / Getting ready, How to do it…, How it works…
- TCP
- TCP connect scan
- performing, Scapy used / Getting ready, How to do it…, How it works…
- performing, Nmap used / Connect scanning with Nmap, How to do it…, How it works…
- performing, Metasploit used / Connect scanning with Metasploit, How to do it…, How it works…
- performing, Dmitry used / Getting ready, How to do it…, How it works…
- performing, Netcat used / Getting ready, How to do it…, How it works…
- TCP port scanning
- about / TCP port scanning
- TCP stealth scan
- performing, Scapy used / Getting ready, How to do it…, How it works…
- performing, Nmap used / Getting ready, How to do it…, How it works…
- performing, Metasploit used / Getting ready, How to do it…, How it works…
- performing, Hping3 used / Getting ready, How to do it…, How it works…
- text editors
- about / Using text editors (VIM and Nano)
- using / How to do it…
- working / How it works…
- TFTP
- about / How to do it…
- three-way handshake
- about / TCP port scanning
- Time To Live (TTL) / How to do it…
U
- Ubuntu Server
- about / Installing Ubuntu Server
- URL, for downloading image disk (ISO file) / Getting ready
- installing / How to do it…, How it works…
- UDP
- UDP port scanning
- about / UDP port scanning
- UDP scan
- performing, Scapy used / Getting ready, How to do it…, How it works…
- performing, Nmap used / Getting ready, How to do it…, How it works…
- performing, Metasploit used / Getting ready, How to do it…, How it works…
V
- VIM / Getting ready
- vim command / How to do it…
- VIM text editor
- using / How to do it…
- VMware Fusion
- URL, for products / Getting ready
- VMware Fusion (Mac OS X)
- security lab, configuring with / Configuring a security lab with VMware Fusion (Mac OS X), How to do it…
- VMware Player
- URL, for downloading free version / Getting ready
- VMware Player (Windows)
- security lab, configuring with / Configuring a security lab with VMware Player (Windows), How to do it…
- vulnerabilities
- validating, with HTTP interaction / Validating vulnerabilities with HTTP interaction, How to do it…, How it works…
- validating, with ICMP interaction / Validating vulnerabilities with ICMP interaction, How to do it…, How it works…
- vulnerability analysis
- performing, NSE used / Getting ready, How to do it…
- performing, MSF auxiliary modules used / Vulnerability scanning with MSF auxiliary modules, How to do it…, How it works…
- performing, Nessus used / Vulnerability scanning with Nessus, How to do it…, How it works…
- vulnerable software packages
- URLs / How it works…
W
- web application analysis
- performing, Burp Suite Spider used / Getting ready, How to do it…, How it works…
- performing, Burp Suite engagement tools / Getting ready, How to do it…, How it works…
- performing, Burp Suite Proxy used / Using Burp Suite Proxy, Getting ready, How it works…
- performing, Burp Suite Scanner used / Getting ready, How to do it…, How it works…
- performing, Burp Suite Intruder used / Getting ready, How to do it…, How it works…
- performing, Burp Suite Comparer used / Getting ready, How to do it…, How it works…
- performing, Burp Suite Repeater used / Using Burp Suite Repeater, How to do it…, How it works…
- performing, Burp Suite Decoder used / Using Burp Suite Decoder, How to do it…
- performing, Burp Suite Sequencer used / Getting ready, How to do it…, How it works…
- web application scan
- performing, with Nikto / Getting ready, How to do it…, How it works…
- web application target
- defining, with Burp Suite / Defining a web application target with Burp Suite, How to do it…, How it works…
- Windows attack surface
- increasing / Increasing the Windows attack surface, How to do it…
- Windows Server
- installing / Getting ready, How to do it…
- Windows XP SP2 (Service Pack 2) / Installing Windows Server, How it works…
X
- xProbe2
- about / Operating system identification with xProbe2
- used, for performing operating system identification / Getting ready, How to do it…, How it works…
Z
- zombie scan
- process / TCP port scanning
- performing / TCP port scanning
- performing, Scapy used / Zombie scanning with Scapy, How to do it…, How it works…
- performing, Nmap used / Getting ready, How to do it…, How it works…