reed book: Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux
Chapter 1 - Introduction
What is Kali?
Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testing
distribution. The creators of the Backtrack series kept Kali in a format very similar to Backtrack, so
anyone familiar with the older Backtrack platform will feel right at home.
Kali has been re-vamped from the ground up to be the best and most feature rich Ethical Hacking/
Pentesting distribution available. Kali also runs on more hardware devices greatly increasing your
options for computer security penetration testing or “pentesting” systems.
If you are coming to Kali from a Backtrack background, after a short familiarization period you
should find that everything is very similar and your comfort level should grow very quickly.
If you are new to Kali, once you get used to it, you will find an easy to use security testing platform
that includes hundreds of useful and powerful tools to test and help secure your network systems.
Why Use Kali?
Kali includes over 300 security testing tools. A lot of the redundant tools from Backtrack have been
removed and the tool interface streamlined. You can now get to the most used tools quickly as they
appear in a top ten security tool menu. You can also find these same tools and a plethora of others all
neatly categorized in the menu system.
Kali allows you to use similar tools and techniques that a hacker would use to test the security of your
network so you can find and correct these issues before a real hacker finds them.
Tech Note:
Hackers usually perform a combination of steps when attacking
a network. These steps are summarized below:
Recon – Checking out the target using multiple sources –
like intelligence gathering.
Scanning – Mapping out and investigating your network.
Exploitation – Attacking holes found during the scanning
process.
Elevation of Privileges – Elevating a lower access
account to Root, or System Level.
Maintaining Access – Using techniques like backdoors to
keep access to your network.
Covering their Tracks – Erasing logs, and manipulating
files to hide the intrusion.
An Ethical Hacker or Penetration Tester (good guys hired to
find the holes before an attacker does) mimics many of these
techniques, using parameters and guidelines set up with
corporate management, to find security issues.
They then report their findings to management and assist in
correcting the issues.
We will not be covering every step in the process, but will
show you many of the techniques that are used, and how to
defend against them.
I would think the biggest drive to use Kali over commercial security solutions is the price. Security
testing tools can be extremely costly, Kali is free! Secondly, Kali includes open source versions of
numerous commercial security products, so you could conceivably replace costly programs by simply
using Kali.
All though Kali does includes several free versions of popular software programs that can be
upgraded to the full featured paid versions and used directly through Kali.
There really are no major tool usage differences between Backtrack and Kali. Kali is basically
Backtrack version 6, or the latest version of Backtrack. But it has been completely retooled from the
ground up, making software updates and additions much easier.
In Backtrack updating some programs seemed to break others, in Kali, you update everything using the
Kali update command which keeps system integrity much better.
Simply update Kali and it will pull down the latest versions of the included tools for you. Just a note
of caution, updating tools individually could break Kali, so running the Kali update is always the best
way to get the latest packages for the OS.
I must admit though, some tools that I liked in the original Backtrack are missing in Kali. It is not too
big of a deal as another tool in Kali most likely does the same or similar thing. And then again you
can install other programs you like if needed.
In addition to stand alone and virtual machine instances of Kali, I also use Kali on a Raspberry Pi - a
mini credit card sized ARM based computer. With Kali, you can do almost everything on a Pi that you
could do on a full sized system. In my book I will cover using the PI as a security testing platform
including testing Wireless networks.
Testing networks with a computer you could fit in your pocket, how cool is that?
Though Kali can’t possibly contain all the possible security tools that every individual would prefer,
it contains enough that Kali could be used from beginning to end. Don’t forget that Kali is not just a
security tool, but a full-fledged Linux Operating System. So if your favorite tool runs under Linux, but
is not included, most likely you can install and run it in Kali.
Ethical Hacking Issues
Using Ethical Hacking a security tester basically acts like a hacker. He uses tools and techniques that
a hacker would most likely use to test a target network’s security. The difference is, the penetration
tester is hired by the company to test its security and when done reveals to the leadership team how
they got in and what they can do to plug the holes.
The biggest issue I see in using these techniques is ethics and law. Some security testing techniques
that you can perform with Kali and its included tools are actually illegal to do in some areas. So it is
important that users check their local, State and Federal laws before using Kali.
Also, you may have some users that try to use Kali, a very powerful set of tools, on a network that
they do not have permission to do so. Or they will try to use a technique they learned but may have not
mastered on a production network.
All of these are potential legal and ethical issues.
Scope of this Book
This book focuses on those with beginning to intermediate experience with Backtrack/ Kali. I think it
would also be a good tool for network administrators and non-security IT professionals that are
looking to get into the field.
We will cover everything from a basic overview of Kali to using the included tools to test security on
Windows and Linux based systems. We will cover Social Engineering, Wi-Fi security, using Kali on
a Raspberry Pi, exploiting passwords, basic computer security testing from reconnaissance to finding
& using exploits, and finally securing your systems.
Why did I write this book?
I have written technical articles on Backtrack for several years now, and have helped out with
multiple Backtrack/ Kali books and training series. I get a lot of questions on how to use Kali/
Backtrack, so I decided that it was time to write my own beginners guide book.
My other reason for writing this book is to help get young people interested in the field of computer
security. The US is currently facing a crisis when it comes to young professionals choosing technical
careers and the cyber security field is no different.
The US government is in need of thousands1 of cyber warriors and some industry experts have even
suggested that the US consider hiring security experts2 from other countries to fill in the gap.
Think about that for a minute.
The numbers game is against us also. The US is the number two user of the internet, with 81% of our
population connected. Now consider the fact that China is in the number one spot3 with almost double
the amount of users. And their connected rate is only at about 41%!
Though many think that the US is ranked number one in cyber offense capabilities, our defense is not
ranked that well. With foreign countries making marked advances in cyber security the US needs to
get as many brilliant young people into the field as possible, and they need to do it sooner rather than
later.
Disclaimer
Never try to gain access to or security test a network or computer that you do not have written
permission to do so. Doing so could leave you facing legal prosecution and you could end up in jail.
The information in this book is for educational purposes only.
There are many issues and technologies that you would run into in a live environment that are not
covered. This book only demonstrates some of the most basic tool usage in Kali and should not be
considered as an all-inclusive manual to Ethical hacking or pentesting.
I did not create any of the tools in Kali nor am I a representative of Kali Linux or Offensive Security.
Any errors, mistakes, or tutorial goofs in this book are solely mine and should not reflect on the tool
creators, please let me know where I screwed up so it can be corrected.
Though not mentioned by name, thank you to the Kali developers for creating a spectacular product
and thanks to the individual tool creators, you are all doing an amazing job and are helping secure
systems worldwide!

No comments:

Post a Comment

Copyright © reed book Urang-kurai