Book Image

Learn Ethical Hacking from Scratch.

By : Zaid Sabih
5 (1)
Book Image

Learn Ethical Hacking from Scratch.

5 (1)
By: Zaid Sabih

Overview of this book

This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks.
Table of Contents (24 chapters)
22
Discovering Vulnerabilities Automatically Using OWASP ZAP

MSFC analysis

The scan process is over. It will nearly take two minutes, and it will discover one new host, because we only had one host, with 33 new services installed on it. Now, we're going to go back and click on my Metasploitable machine to see what we have discovered. We can see in the following screenshot it has found 33 services and also it managed to detect one vulnerability:

Results of Metasploitable scan

Go to Analysis | Hosts, and we will that see that we have our host here, and it has been scanned correctly. It's a VMware, it's a server, and it's running on Linux 8.04:

Host Scan

If we click on the IP, we will see in the following screenshot. The first thing that we see is the installed services:

Installed services

We can see the NAME of the service, for example, dns, running on port 53; the PROTO, which means the protocol is udp; it's...