Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Kali Linux Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Kali Linux Cookbook

Kali Linux Cookbook - Third Edition

By : Corey P. Schultz
close
close
Kali Linux Cookbook

Kali Linux Cookbook

By: Corey P. Schultz

Overview of this book

This hands-on guide will help you become a penetration testing expert by gaining command of the powerful tools of Kali Linux, from versions 2024.3 through 2025.1, aligned with the latest features introduced and applying them in real-world security assessments. This cookbook’s third edition is updated to include the latest advancements in cybersecurity. The author leverages their 20 years of industry experience to guide you through installing Kali on multiple platforms, setting up lab environments, and using modern tools, such as Nmap, Metasploit, Wireshark, OpenVAS, and AI-driven reconnaissance. You’ll also explore automated social engineering, wireless hacking, web and database exploitation, and advanced persistence techniques, delivering a comprehensive and up-to-date penetration testing resource. Recognizing the critical role of human factors in security, this edition expands on social engineering tactics, including psychological principles and AI-driven automation, to craft highly effective attack campaigns. By the end of this book, you’ll have strengthened your grasp of the entire penetration testing process, from environment setup and reconnaissance to vulnerability analysis, exploitation, and maintaining access, and be equipped with industry-standard tools to enhance your effectiveness as a security professional.
Table of Contents (17 chapters)
close
close
15
Other Books You May Enjoy
16
Index

Performing a SQL injection attack

In this recipe, you will exploit a SQL injection vulnerability in a web application to extract sensitive data from its backend database. Using the sqlmap tool, you will automate the process of identifying injectable parameters, enumerating databases, and dumping table contents. You will also see how other tools, such as password cracking, can come into play.

Getting ready

  • A Kali Linux VM that is up and operational
  • A BeeBox bWAPP VM that is up and operational
  • Burp Suite and Firefox configured per the Performing a command injection attack recipe

How to do it…

  1. Open your browser and go to http://192.168.92.7/bWAPP. Log in and set the security level to low.
  2. Under Choose your bug, select SQL Injection (GET/Search) and then Hack.
Figure 12.30 – Choose SQL Injection

Figure 12.30 – Choose SQL Injection

  1. This will bring you to the Search for a movie box. Enter man and click Search. Note the web address.
Figure 12.31 – Search “man”

Figure 12.31 – Search...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Kali Linux Cookbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon