Penetration Testing can be defined as legal and authorize attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure.
You can also chose any one of this name according to your wish.
- Pen Testing
- Ethical Hacking
- White Hat Hacking
Now its important to understand some roles which you wanna play on your stage.
Choose Your Role
|Good Role||Evil Role|
|Ethical Hackers / White Hat Hackers / Penetration Tester||Black Hat Hackers / Crackers / Malicious Attackers|
|Their intentions are noble and often aim to benefit or protect others.||Their intentions are selfish or harmful in nature.|
|Take advantage of user’s lack of awareness about cyber threats to defraud them with various phishing techniques.||Educate people about cybersecurity threats and risks, as well as ways to mitigate them.|
Your Own Stage with lots of props
So, we are choosing Kali Linux as our Stage and with props I mean 600 tools.
Kali Linux – Stage Introduction
When it comes to penetration testing, hacking, and offensive Linux distributions, one of the first things to be mentioned is Kali Linux.
The software comes pre-packaged with a variety of different command line hacking tools geared towards various information security tasks, such as PT, network security, computer forensics, and application security.
Why people choose Kali Linux?
I think these reasons are sufficient to make your mind to choose Kali Linux as your hacking stage.
- It offers more than 600 penetration testing tools from various fields of security and forensics.
- Though penetration tools tend to be written in English, Kali provides multilingual support.
- It supports a wide range of wireless devices.
- Comes with the custom kernel, patched for injections.
- Developed in a secure environment.
- It’s free and open-source software.
Kali Linux installation is a fairly simple process and you have multiple installation options. The most-preferred methods include:
- Installing Kali Linux by making a Kali (Linux) bootable USB drive.
- Kali Linux hard disk install.
- Using virtualization software, such as VMware or VirtualBox.
- Dual-booting Kali Linux with the operating system.
So, here’s a task for you. I hope you’ll do it.
Search these installation methods on YouTube, install it and then let’s get started.
For Penetration Testing, I’m personally using Kali Linux.
Working on your Stage
Now, you successfully logged in Kali Linux.
Getting Started with Kali Linux GUI
The Kali Desktop has a few tabs you should become familiar with.
- Applications Tab
Provides a Graphical Dropdown List of all the applications and tools pre-installed on Kali Linux.
- Places Tab
Places menu has the following tabs, Home, Desktop, Documents, Downloads, Music, Pictures, Videos, Computer and Browse Network.
- Kali Linux Dock
Provides quick access to frequently used/favorite applications. Applications can be added or removed easily.
And Other things like about Terminal, basic commands and many more. I already cover them up in my other articles.
You can check here: https://thepycharmgirl.com/linux-basics-2/
Introduction to your Props
Kali Linux does excellent job separating these useful utilities into the following categories:
|1. Information Gathering||Amap, CaseFile, dnmap, InSpy, Nmap, Nikto, theHarvester|
|2. Vulnerability Analysis||Nmap, openvas, sqlmap, Lynis, Oscanner|
|3. Wireless Attacks||Aircrack-ng, Ghost Phisher, Reaver, wifiphisher, Kismet|
|4. Web Applications||Burp Suite. Grabber. Nikto, jSQL Injection, Recon-ng, sqlmap, WPScan|
|5. Exploitation Tools||MF , sqlmap, Maltego Teeth|
|6. Stress Testing||Reaver, Termineter|
|7. Forensics Tools||Galleta, RegRipper, Dumpzilla|
|8. Sniffing & Spoofing||BurpSuite, bettercap, sctpscan, Wireshark, Wifi Honey|
|9. Password Attacks||HashCat, Ncrack, Rainbow crack, John the Ripper|
|10. Maintaining Access||WebShells, CryptCat, sbd|
|11. Reverse Engineering||jad, smali|
|12. Reporting Tools||MagicTree,Dradis|
|13. Hardware Hacking||apktool, Arduino|
If you want to know more about the props visit this site : https://tools.kali.org/tools-listing
Phases Of Penetration Testing
Find the enemy. Don’t let the enemy find you. Recon! Recon! Reconnaissance!
Many beginners skip the reconnaissance phase and go straight to exploitation.
Well, the reason is pretty simple. Gathering information about their victim doesn’t seems fascinating to them.
But they don’t know that gaining more information about your victim, the easier it gets when you try to gain access.
Some common tools used for reconnaissance :
- Google and Shodan (My favorite)
Want to know more about reconnaissance do check this out : https://thepycharmgirl.com/information-gathering/
This phase is where you come in contact with the target. It involves sending packets of data to the target and interpreting their response.
Scanning phase gives you useful information about the target like :
- Open Ports
- IP Addresses
- Operating System Information
- Services Installed and so on.
Some common tools used for scanning :
Now the thrills begins!!!
This phase where you gain access to the system. A successful exploit should give you control of the system to at least a user level.
Now from there you perform privilege escalation to gain root access to the target.
When its come to exploitation, Metasploit Framework is the best tool you’ll ever find.
4. Maintaining Access
Gaining access to systems is not easy, especially on corporate networks and going through the same process to exploit the target again is not a piece of cake.
This is where maintaining access comes in. You can install backdoors, keyloggers, and other pieces of code that let you into the system whenever you want.
The final phase of Penetration Testing. This is the phase which will describes your role, that you’re a malicious attacker and an ethical hacker.
Once your penetration test is complete, you summarize all the steps you have taken from reconnaissance to gaining access.
This will help the organization you are working for to understand its security architecture and defend itself better.