Build your security opposed to internet assaults with Kali Linux 2.0
About This Book
- Gain a deep realizing of the failings in net functions and make the most them in a pragmatic manner
- Get hands-on internet software hacking adventure with more than a few instruments in Kali Linux 2.0
- Develop the sensible abilities required to grasp a number of instruments within the Kali Linux 2.0 toolkit
Who This publication Is For
If you're already operating as a community penetration tester and need to extend your wisdom of net software hacking, then this e-book adapted for you. people who find themselves attracted to studying extra concerning the Kali Sana instruments which are used to check internet functions will locate this e-book a completely important and fascinating guide.
What you are going to Learn
- Set up your lab with Kali Linux 2.0
- Identify the adaptation among hacking an internet software and community hacking
- Understand different concepts used to spot the flavour of internet applications
- Expose vulnerabilities found in internet servers and their functions utilizing server-side attacks
- Use SQL and cross-site scripting (XSS) attacks
- Check for XSS flaws utilizing the burp suite proxy
- Find out concerning the mitigation innovations used to negate the consequences of the Injection and Blind SQL attacks
Kali Linux 2.0 is the recent iteration of the industry-leading back off Linux penetration trying out and safety auditing Linux distribution. It comprises numerous hundred instruments aimed toward quite a few info safeguard projects comparable to penetration checking out, forensics, and opposite engineering.
At the start of the publication, you can be brought to the innovations of hacking and penetration checking out and should get to grasp concerning the instruments utilized in Kali Linux 2.0 that relate to internet software hacking. Then, you are going to achieve a deep realizing of SQL and command injection flaws and how you can make the most the issues. relocating on, you'll get to understand extra approximately scripting and enter validation flaws, AJAX, and the protection concerns relating to AJAX.
At the tip of the booklet, you'll use an automatic process known as fuzzing so as to establish flaws in an online program. eventually, you are going to comprehend the net software vulnerabilities and the ways that they are often exploited utilizing the instruments in Kali Linux 2.0.
Style and approach
This step by step consultant covers each one subject with particular useful examples. each thought is defined with the aid of illustrations utilizing the instruments to be had in Kali Linux 2.0.