Book Image

Hands-On Penetration Testing with Kali NetHunter

By : Glen D. Singh, Sean-Philip Oriyano
Book Image

Hands-On Penetration Testing with Kali NetHunter

By: Glen D. Singh, Sean-Philip Oriyano

Overview of this book

Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
Table of Contents (19 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Preface

Hands-On Penetration Testing with Kali NetHunter focuses on penetration testing using a mobile platform to simulate real-world attacks. The Kali NetHunter platform was designed to run on Android-based devices such as smartphones and tablets. Its portability makes this an interesting topic and opens the door for many possible applications in cyber security.

Who this book is for

This book is designed for people who are beginning a career in penetration testing and people who are already in the cyber security field and would like to further their knowledge and understanding of penetration testing using a mobile platform. Readers should have some fundamental knowledge of penetration testing or cyber security prior to starting this book.

What this book covers

Chapter 1, Introduction to Kali NetHunter, introduces Kali NetHunter and describes some of the tools within its mobile platform. You'll learn about the Android platform and its security model, and finally you'll learn how to install the Kali NetHunter platform on an Android device.

Chapter 2, Understanding the Phases of the Pentesting Process, covers the importance and need for penetration testing in the digital world. You'll learn about the different types of threat actors and cyber security teams within an organization. Furthermore, you'll learn the basics of penetration testing by learning about the phases and various frameworks.

Chapter 3, Intelligence Gathering Tools, explores the various methods and resources a penetration tester can use to obtain information about a target.

Chapter 4, Scanning and Enumeration Tools, covers an overview of scanning and enumeration. You'll learn about various scanning techniques and tools in order to better profile a target. Additionally, using numerous techniques and tools, you'll be able to extraction information from the target using the process of enumeration.

Chapter 5, Penetrating the Target, covers some top tips for successfully exploiting a system and gaining access. By the end of this chapter, you'll be able to use various techniques to gain access to a target.

Chapter 6, Clearing Tracks and Removing Evidence from a Target, covers the importance of clearing your tracks as a penetration tester. You'll learn about various types of logs and their locations, a number of utilities and tools to assist in clearing log data, and removing files from both Windows and Linux systems.

Chapter 7, Packet Sniffing and Traffic Analysis, explores various packet sniffing techniques, tools, and devices. At the end of the chapter, you will be able to perform packet sniffing using a number of native tools within Kali NetHunter. Additionally, you'll learn how to analyze data using some very well-known tools.

Chapter 8, Targeting Wireless Devices and Networks, covers the types of wireless networks, standards, and topologies. You'll learn about a wide array of threats and attacks that occur on wireless networks and will be able to perform these attacks yourself.

Chapter 9, Avoiding Detection, covers the fundamentals a penetration tester needs to know and understand in order to be stealthy using various techniques during a penetration test.

Chapter 10, Hardening Techniques and Countermeasures, covers commonly-found threats in the digital world and explains how to secure network appliances, client and server operating systems, and mobile devices.

Chapter 11, Building a Lab, covers the requirements and process of setting up a personal penetration testing lab environment, as well as how to assemble it.

Chapter 12, Selecting A Kali Device and Hardware, helps you choose a suitable device for Kali NetHunter.

To get the most out of this book

Before beginning this book, it is recommended that you have at least a fundamental knowledge of cyber security. You should have an understanding of cybersecurity concepts and threats in the cybersecurity landscape. For the practical aspects of this book, we used both Kali Linux and Kali NetHunter on an Android smart device. The first chapter covers the installation of Kali NetHunter on Android.

Download the color images

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: http://www.packtpub.com/sites/default/files/downloads/9781788995177_ColorImages.pdf.

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "I usually specify the filename as an HTML file, such as test.html."

Any command-line input or output is written as follows:

apt-get install metagoofil

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Go to Settings | Developer options and enable both the Advanced reboot and AndroidDebugging options."

Note

Warnings or important notes appear like this.

Note

Tips and tricks appear like this.

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, mention the book title in the subject of your message and email us at [email protected].

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packt.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.

Piracy: If you come across any illegal copies of our works in any form on the Internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Reviews

Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!

For more information about Packt, please visit packt.com.

Disclaimer

The information within this book is intended to be used only in an ethical manner. Do not use any information from the book if you do not have written permission from the owner of the equipment. If you perform illegal actions, you are likely to be arrested and prosecuted to the full extent of the law. Packt Publishing does not take any responsibility if you misuse any of the information contained within the book. The information herein must only be used while testing environments with proper written authorizations from appropriate persons responsible.