Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Hands-On Penetration Testing with Kali NetHunter
  • Table Of Contents Toc
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

By : Glen D. Singh, Oriyano
3 (4)
close
close
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

3 (4)
By: Glen D. Singh, Oriyano

Overview of this book

Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
Table of Contents (17 chapters)
close
close
Lock Free Chapter
1
Section 1: Exploring Kali NetHunter
4
Section 2: Common Pentesting Tasks and Tools
9
Section 3: Advanced Pentesting Tasks and Tools

Avoiding Detection

Over the course of this book, we've discussed a lot of topics covering the phases of penetration testing, from information gathering for exploitation to cover our tracks. To execute a successful penetration test without the target’s security team being aware, you must be stealthy like a hacker.

Apart from detecting and exploiting vulnerabilities during a penetration test, organizations also use this type of service to test their existing security controls and detection rate.

As mentioned in Chapter 2, Understanding the Phases of the Pentesting Process, the blue team is responsible for the monitoring, detection, and mitigation of any security threats within a parent organization. If the blue team should fail to detect the activities of a penetration tester, this would mean two things: the penetration tester was extremely stealthy and the...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Hands-On Penetration Testing with Kali NetHunter
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon