(This page has no text content)
Hacking with Kali Linux A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing Jack Mathew
Table of Contents Introduction Chapter 1: Definition of Hacking and Types of Hackers Purpose of Hacking Types of Hackers Hacktivist Grey hat Ethical Hacker Cracker Types of Hacking DNS Spoofing Cookie Theft UI Redress Virus Phishing How Do Hackers Get Access into Computer Systems Guarding Against Hacking Chapter 2: Cybersecurity Cyber Threat Scale Advancement of Cybersecurity Protecting the End-User Chapter 3: Types of Cyber Attacks Birthday Attack Eavesdropping Attack XSS, Cross-Site Scripting Attack SQL Injection Attack Password Attack
Drive-By Attack Phishing and Spear Phishing Attacks MitM, Man-in-the-Middle Attack Replay IP Spoofing Session Hijacking DoS, Denial-of Service, and DDoS Distributed Denial-of-Service Attacks Botnets Ping of Death Attack Smurf Attack Teardrop Attack TCP SYN Flood Attack Chapter 4: Types of Malware Spyware Adware Ransomware Droppers Worms Logic Bombs Trojans Stealth Viruses Polymorphic Viruses System or Boot-Record Infections File Infectors Macro Viruses Chapter 5: How the Hacking Process Works Preparation Phase
Chapter 6: Why Hackers Use Linux Why Hackers Prefer Linux Operating System Easy to Use Less RAM Consumption Linux is the Future No Requirement for Drivers Serious Take on Privacy Hacking Tools are Often Written for Linux Several Programming Languages Have the Support of Linux Less Vulnerable Low Cost Flexibility Maintenance Portable and Light Command-Line Interface Multitasking Network Friendly Stability Chapter 7: Kali Linux Installation and Updates Kali Linux Installation Requirements for Installation The Installation Process Updating Kali Linux Chapter 8: Installing Kali Linux on Virtual Machine Chapter 9: How to Organize Kali Linux Overview of the Desktop Apache Webserver Screencasting Places Menu Workspaces
Auto-Minimizing Windows Command-Line Tools Application Menu Favorites Bar Chapter 10: Scanning (nmap, massscan, hping3) and Managing Networks (Wireshark) Effective Use of nmap Enumerating a Huge Quantity of Hosts with Massscan Massscan Features Uses of Masscan Hping3 as a Packet Generator and Network Scanning Tool Some of the Usages of hping Network Scanning Tool Securing and Monitoring Your Network with Wireshark Wireshark Installation Chapter 11: Firewalls Functions of Firewalls The Definition of Personal Firewall The Need for Personal Firewall Using a Personal Firewall for Defense Firewalls Types SMLI, Stateful Multilayer Inspection Firewalls NAT, Network Address Translation Firewalls Proxy Firewalls NGFW, Next-Generation Firewalls Chapter 12: Obtaining User Information: Maltego, Scraping, Shodan/Censys.io Architecture of Maltego Launching Maltego Web Scraping with Python Shodan and Censys
Chapter 13: Kali Linux on Portable Devices Like Raspberry Pi Step 1: Installation of Kali on the Raspberry Pi Installation of Kali to Windows SD Card Kali installation in OS X SD Card Step 2: the Display Hook-Up Step 3: Have Everything Plugged in and Launch Step 4: Enable Wi-Fi as you Log in Chapter 14: MalDuino Elite Lite The Hardware The Setup The Software Protecting Yourself From MalDuino Admin Rights Lockdown Duckhunt Physical Protection Chapter 15: Kismet Watching the Activities of Wi-Fi User Using Kismet What We Can Get From Wi-Fi Essential Tools Chapter 16: Bypassing a Hidden SSH Chapter 17: Bypassing a Mac Address Authentication and Open Authentication Chapter 18: Hacking WPA and WPA2 Chapter 19: Secure and Anonymous Using Tor, Proxy Chains, and VPN What is Tor
Using Proxy Chains VPNs Chapter 20: IP Spoofing Chapter 21: Penetration Testing with Metasploit Conclusion
Introduction Congrats on buying Hacking with Kali Linux, and thank you for doing as such. The accompanying sections will examine the entirety of the various parts that we need to find out about when the time has come to work with hacking and working with Kali Linux to complete this all. There are various instruments that we can use with regards to hacking, yet one of the absolute best working frameworks that we can use to accomplish this is the Kali Linux framework. This manual will set aside some effort to go through the entirety of that and become familiar with how we can make everything work. The beginning of this manual will investigate a portion of the essentials of hacking, the reasons that we would need to invest some energy taking a gander at hacking and utilizing it for our own organizations, and a decent glance at the contrast between moral programmers, untrustworthy programmers, and everybody in the middle. From that point, we will investigate somewhat about online protection and digital assaults. With our advanced world and the way that such countless individuals are on the web and attempting to share and take a gander at data constantly, it is no big surprise that programmers are attempting to discover techniques that will permit them to get onto the PCs and organizations out there to take individual and monetary data any time that they might want. That is the reason we will set aside some effort to take a gander at how we can keep our organizations free from any danger with online protection while additionally realizing which kinds of digital assaults are the most probable. Presently the time has come to take this somewhat further and take a gander at how hacking will function. We will investigate the hacking cycle in more subtleties, while additionally taking a gander at malware, and how that, and a couple of different kinds of assaults will be ready to become possibly the most important factor to assist us with getting results. At that point, the time has come to proceed onward to a portion of the things that we can do with the Kali Linux framework. This is frequently viewed as extraordinary compared to other coding working frameworks to work with, and we will set aside the effort to take a gander at what is the issue here and how we can utilize it for our requirements. In this part, we will take a gander
at the reasons that individuals like to work with Linux, how to set up Kali Linux, how to work with Kali in a Virtual Machine if this is the a most ideal choice for us, and even how to arrange Kali Linux, so it is prepared for a portion of the assaults that we need to do. This is only the start of what we can do about hacking. Since we have set the stage and we are for the most part all set with a portion of this, the time has come to take it somewhat further and take a gander at a portion of the slick things that we can utilize Kali Linux to help us out with. We will see how to check and deal with our organizations, the significance of firewalls, how to acquire client data when we need it, the utilization of Kali Linux on a portion of the compact gadgets we need to utilize, and even how to work with MalDuino and Kismet. This isn't all, however. We will investigate a couple of a greater amount of the means that we can work with when the time has come to hack an organization of our decision and get together the data that we might want. To complete out this manual, we are likewise going to invest some energy taking a gander at how we can sidestep a secret SSHS, how to hack onto the WPA and WPA2 remote frameworks, how to utilize a portion of the various devices out there to ensure that you stay covered up and nobody will actually want to follow the assaults back to you, and how we can utilize Metasploit to help us complete our own entrance testing. As we can see with this manual, there is a huge load of various parts that need to become an integral factor so we can truly finish the assault that we might want to work with. These are various techniques that programmers, the individuals who are fresh out of the plastic new and the individuals who have been in the game for quite a while, can do. At the point when you are hoping to ensure your own organization or the organization for another person, or you might want to hack onto another organization, you will be glad that you have these devices prepared to assist you with completing this work. There are a ton of cool things that we can do when the time has come to work with the way toward hacking and having this all readied and all settings can be perhaps the best technique you can decide to ensure your own organization. At the point when you are prepared to study hacking and the entirety of the instruments and methods that we can utilize while hacking alongside the Kali Linux framework, make a point to look at this manual to begin.
There are plenty of books on this subject on the market, thanks again for choosing this one! Every effort was made to ensure it is full of as much useful information as possible; please enjoy! Chapter 1 Definition of Hacking and Types of Hackers The way toward hacking includes getting unapproved access into a PC framework, or a gathering of PC frameworks. Programmers gain admittance to frameworks by figuring out codes or passwords. The method programmers use to get code or secret key is breaking and a programmer is somebody that embraces the way toward hacking. Programmers can hack an email account, a web-based media webpage, a site, a whole LAN organization, or a gathering of frameworks. Eventually, it is through secret key calculations programs that the programmers get admittance to a secret phrase. For every one of their day-by-day needs, individuals and organizations utilize PCs or PCs. For a consistent progression of business applications and data, a few associations have WAN, wide territory organization, site or space, or a PC organization. Therefore, there is a high-hazard openness of these organizations to programmers just as the rest of the universe of hacking. Purpose of Hacking Generally, the goal of certain programmers is to cause certain reputational or monetary damage to an element, gathering, or individual through their
noxious or criminal expectation. They accomplish this by spreading noxious or inaccurate reports that can cause the interruption of the business after they steal their assets or take their classified information. Organizations can end up in some socially negative circumstances with this deceptive data. Additionally, as deserving of law, hacking is a type of web or cybercrime. Nonetheless, government law organizations and explicitly certified foundations take part in another side of hacking on an expert level. In this case, they will probably keep people from creating any mischief or counter some unacceptable expectations of the programmers. Additionally, this kind of hacking is done to ensure and save the residents and society on the loose. Types of Hackers It is very fundamental for us to separate between the destinations and parts of programmers by realizing their sorts to get the detail on the above-suggested targets. Hacktivist Leaving disagreeable data on a site that they hack is the focal point of these kinds of programmers. They do this to spread strict, social, and political messages. Additionally, different countries can be focused on by these programmers. Grey hat These kinds of programmers have no aim of false when they access a framework with no approval. They are between the high contrast cap programmers. The goal of these programmers is to show the partners of the framework parts of its shortcomings and weaknesses. Ethical Hacker The goal of these sorts of programmers is to wipe out and recognize suspected shortcomings. They survey frameworks by getting access as authoritatively and perceived stepped programmers and they are referred to likewise as a white cap. A couple of things they likewise do is to recover
basic data required for security purposes, decipher codes hostile to social or unlawful arrangements, and weakness appraisal. They are paid, affirmed, and prepared specialists. The moral programmers are the solitary people who are permitted to do this sort of hacking legitimately. They know similar sorts of rules to follow as a dark cap programmer and will utilize a portion of similar thoughts en route. Yet, they have for the most part acquired consent to go through and do a portion of these alternatives, as opposed to attempting to do it to acquire their very own benefit. For the moral programmer, the objective is to keep the framework as free from any danger as conceivable en route. They need to either ensure their own organization, or the organization of another person who understands what they are here. This will make it simpler for them to get onto the organization without doing such in an unlawful way. These programmers will utilize a lot of similar strategies for their assaults, as we see with a portion of different sorts of programmers. This implies that they will depend on entrance testing, delineating assaults, and that's just the beginning. In any case, they will do it as an approach to help them sort out where the weaknesses in the framework are instead of taking a gander at ways that you can misuse them. Cracker These are dark caps. They secure section into sites or PC organizations through an unapproved way and with a mala fide goal. There is additionally a connection of individual increase in their expectation through security rights infringement to profit criminal associations, taking of assets from online financial balances, taking private authoritative data, etc. Nowadays, these programmers take part in their exercises in an obscure way and they have a place with this classification. Types of Hacking The dangers that sites need to manage are the absolute most successive dangers of hacking. Programmers take part during the time spent unveiling the substance of a site or changed with the utilization of unapproved access. The people or gatherings that are against social or political associations most
occasions focus on their sites. Likewise, they hack public or legislative data sites, and this is altogether normal. Here are some of normal the hacking techniques they use on the sites: DNS Spoofing Here and there, clients may disregard the reserve information of an area or site, and this strategy for hacking utilizes this store information. At that point, it directs the information toward another vindictive site. Cookie Theft Treats contain login passwords, secret data, etc, and with the utilization of noxious codes, programmers will approach the site to take treats. At the point when a genuine organization utilizes these, it will assist them with giving you superior help in general. Yet, it stores a ton of additional data on you and your framework, and if the programmer can take these treats, they will actually want to utilize them in any way that they might want. This could be hazardous and is an integral explanation that it is frequently best to kill and debilitate the utilization of treats in any case. UI Redress Programmers utilize this technique by making a phony UI. Accordingly, clients will be coordinated to another site through and through when they click to go to a particular site. Virus At the point when programmers gain admittance to a particular site, they discharge an infection into the records of the site. Their targets are to ruin the assets or data on such a site. There are many kinds of infections that we can get together with, and they can be spread through email connections, sites that have been undermined, and then some. These infections can assume control over the PC, closing down records, taking data, and in any event, spreading to a portion of the contacts that you
have on your framework to get the data that the programmers might want to have. This is the reason it is so imperative to go through and be cautious about the sorts of sites that you open, and to ensure that you won't sites that could hurt your PC. Phishing They utilize this technique to repeat the first site, and thusly, the programmers will effectively seize and abuse the clueless client's data like Mastercard subtleties, account secret phrases, thus some more. Commonly these will be sent through email. The email will show up as it comes from a genuine source, for example, your bank or another site that you invest some energy in, requesting you to look at a message or change your username and secret word. Since the programmer works really hard concealing things and making them look official, it doesn't take that long for individuals to get bulldozed. Indeed, even the site will look genuine so it is not difficult to tap on the various things and enter the data. If somebody succumbs to this, the programmer can take the entirety of that data and use it to really get into the record of yours that they might want. How Do Hackers Get Access into Computer Systems We can get data by working and speaking with others through the assistance of some heroes in the PC world that make organizations. And afterward, for an assortment of reasons, we have some not very great people that cause inconveniences by utilizing their PCs to worm their way into those organizations. These arrangement of people are programmers and part of the things they participate in include: Shut down a website by creating heavy traffic to it Obtain credit card information Get passwords Steal secrets Regardless of whether by upsetting the same old thing or taking data for their
benefit, programmers are consistently grinding away. Every so often, there will consistently be news about them, and at a point, you may probably be pondering about precisely the thing programmers are doing. They are continually getting into the framework by taking passwords. For them to break the security of an organization, the initial step for them is to discover a secret phrase. Accordingly, to make your secret phrase hard to sort out by anybody, it is very helpful to transform them consistently. For you to understand what programmers do when individuals examine them, here are some key terms that you may most likely catch wind of them: Trojan horse: this method gives off an impression of being a useful program and clients are fooled into clicking and opening it. Yet, the PCs of such clients can get unforeseen assaults that can be in the background or undetected. Since these will sneak onto the PC through secret techniques, for example, being on a program that appears to be genuine, it is difficult to identify them. In any case, when the Trojan pony gets into the framework, it can open up secondary passages and different things to assist the programmer with getting the data that they need. Session hijacking: this procedure includes programmers embeddings malignant information bundles into a real information transmission over the web association. Script kiddie: these are unsophisticated or youthful programmers who act as genuine programmers while utilizing programmers' instruments. These people won't think often that amount about figuring out how to hack. They need to finish an assault, yet they don't actually think often about the rudiments that go with it or the codes that they need to utilize. All things being equal, they will simply take on a portion of the instruments and projects that are now out there and will utilize these to take care of them. They simply need to finish the hack and receive the data in return, without agonizing over learning any of the strategies en route. Root kit: an interloper can camouflage and grow his authority over your framework by utilizing this arrangement of instruments. Root access: for any programmer to deal with a framework, root access is the most elevated level of access. Root access is the most wanted by genuine programmers to a PC framework.
Email worm: programmers utilize a characteristic-looking email message to send a little program or infection-loaded content to a clueless casualty. Denial-of-service attack: programmers utilize this technique to flood a site with bogus traffic, accordingly forestalling the arrangement of the person in question or devastating it from taking care of its ordinary traffic. This one will turn down the worker for a specific organization and can make it difficult for genuine clients to get onto the framework by any means. This permits the programmer to get an opportunity to leave a Trojan or a secondary passage or something different on that organization. Distributed Denial of Service: This one will be somewhat unique since it will use more than one PC to do the assault. In the DoS, the programmer is simply utilizing one PC, and the firewall can typically see that IP address and will quit permitting the help from that address. With the DDoS, the programmer is utilizing various PCs to do the cycle which makes it harder for the firewall to stop the assault. Buffer overflow: programmers utilize this strategy by overwhelming application support to convey malignant orders to a framework. Back door: programmers gain admittance to a PC framework utilizing this mysterious pathway. Deceptions, infections, and different kinds of malware can come in and use this choice to assist them with getting onto the framework and returned and forward however many occasions as they might want. If you are attempting to secure your own PC or another framework, ensure that when you are completely done, you fix everything up so there are no potential secondary passages for a programmer to get past.
Guarding Against Hacking A diligent danger that is consistently influencing the security of a country and its residents is hacking. At the level of the person, when programmers wipe away the whole well-deserved monetary reserve funds of somebody, it can bring about untold monetary misfortunes. Likewise, it can prompt long-haul repercussions and major monetary misfortunes through the burglary of information at the hierarchical level. It is vital to block this awful danger and defend it. There are a ton of things that you can do to ensure that you can protect your own organization against another programmer. Setting this up well, and being cautious about how your own organization will act will be so essential to keep the programmers out. A portion of the various advances that you can take to make preparations for any programmers that might want to get on your organization will include: 1. Be cautious about the messages that you use. Large numbers of the assaults that we will investigate in this manual will be enacted with the assistance of email. This isn't correct constantly. Yet, on the off chance that you are cautious with a portion of the messages that you open, particularly the connections, at that point you can stay away from a great deal of these assaults from a programmer. 2. Pick out some solid passwords that are more diligently to figure or get past with a beast power assault. Choose long passwords, utilize a mix of letters, numbers, and images, and ones that won't be connected back to you or simply to speculate all. Numerous programmers will begin by attempting to assault your passwords since this is a flimsy part of your security. You can ix this with the assistance of a solid secret word. 3. Do an infiltration test to search for a portion of the weaknesses that are on the framework. We will investigate how to function with infiltration testing, later on, however, this is an extraordinary method to sort out which puts the programmer may attempt to use to get onto your organization. Doing one for yourself will assist with keeping it secured. 4. Change passwords consistently. At the point when you change the
secret phrase consistently, it is much harder for the programmer to think about what it is or utilize a portion of different strategies for secret key breaking to overcome with the assistance of the secret phrase. 5. Do not offer data about the organization to any other person. Any significant and touchy data about your organization should be kept in mystery and covered up. The more individuals who think about your organization, the more probable it is that the data will get out, and a programmer will actually want to use this. 6. Consider scrambling the data that you ship off others in your interchanges. This makes it hard for any individual who doesn't have the correct key to peruse any of the data that you are sending, regardless of whether it gets captured. 7. Pick out a solid security convention to ensure your organization. Ensure that you are not working with the WEP choice since this one is frequently simpler for a programmer to overcome. While the WPA and WPA2 are still choices that are defenseless against an assault, they are much more grounded and can keep you more secure en route. 8. Use enemy malware and against infection programming. These will make it harder for any of the assaults that the programmer is attempting to send your approach to get past. 9. Make sure that you are refreshing your product and working framework as frequently as it is required. These updates will help cut out a portion of the weaknesses that are found in the working framework you use, and another programming, so doing the update will make it harder for a programmer to get onto your framework. As should be obvious, there will be a ton of alternatives that you can work with when the time has come to ensure your PC contrasted with a portion of the hacks that are coming in your direction. Make a point to work with a portion of these choices, and you will find that it is significantly harder for a programmer to get on your framework and use it for their own benefit en route.
Chapter 2 Cybersecurity The act of protecting information, organizations, electronic frameworks, cell phones, workers, and PCs from vindictive assaults is network safety. Additionally, they allude to it as electronic data security or data innovation security. Basic classifications can find a way into the terms just as an assortment of settings, from portable to business processing. The most eccentric network safety factor is end-client training. At the point when individuals neglect to follow sound security rehearses, they can coincidentally acquaint an infection with a generally secure framework. In this way, it is very fundamental for the security of any association to teach its representatives not to connect unidentified USB drives and to erase dubious email connections. For any reasons for loss of information or activities, the way with which an association reacts to a network safety occurrence is the business congruity and calamity recuperation. Furthermore, for the association to get back to a similar working limit as before the occasion, the cycles that direct how the association reestablishes its data and activity are the catastrophe recuperation approaches. While the association is endeavoring to work without explicit assets, the association has an arrangement that it counts on, which is the business congruity. The choices and techniques of ensuring and taking care of information resources are operational security. This interaction incorporates the exercises that figure out where and how information might be shared or put away and the clients' consents while getting to an organization. At the point when information is on the way or away, the protection and honesty of information are ensured by data security. For gadgets and programming to be liberated from dangers is the focal point of application security. Even though it is intended to secure information, an undermined application could give
Comments 0
Loading comments...
Reply to Comment
Edit Comment