• Page

    Kali Linux Certified Professional (KLCP)

    The Kali Linux Certified Professional (KLCP) is a professional certification that testifies to one's knowledge and fluency in using the Kali Linux penetration testing distribution.  KLCP holders demonstrate an in-depth understanding and utilization of the Kali Linux operating system. Individuals with this certification have the skills, knowledge and abilities to put Kali Linux to use [...]
  • Topic

    Acknowledgments of Joe O’Gorman

    7. Acknowledgments of Joe O’Gorman – 2021 Revision Kali Linux has changed a lot since Kali Linux Revealed first released back in 2017. From additional developers to moving away from using root as the default user, lots of progress has been made over the years. Kali Linux Revealed was due for an updated revision, and […]

  • Page

    Cookie Policy

    What is a Cookie First-party cookies and third-party cookies Google Analytics Persistent and session cookies How do I manage cookies? What kind of Cookies do we use? Updates to this Cookie Policy Cookie Policy Last revised: August 20, 2019 Our Cookie Policy (the “Cookie Policy”) describes the different cookies used in connection with websites owned […]

  • Topic

    Index

    Jump to Index Section Use this glossary index to quickly find a pages content related to the topics below. A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S [...]
  • Topic

    Going further

    12.3. Going Further This book taught you a lot of things that any Kali Linux user should know, but we made some hard choices to keep it short, and there are many topics that were not covered. 12.3.1. Towards System Administration If you want to learn more about system administration, then we can only recommend that you […]

  • Topic

    Showing Off Your Newly Gained Knowledge

    12.2. Showing Off Your Newly Gained Knowledge Are you proud of your new Kali Linux skills? Would you like to ensure that you remember the really important things? If you answer yes to one of those questions, then you should consider applying for the Kali Linux Certified Professional program. It is a comprehensive certification that will […]

  • Topic

    Keeping up with Changes

    12.1. Keeping Up with Changes With a constantly-changing distribution like kali-rolling, some parts of the book will necessarily become obsolete. We will do our best to keep it up to date (at least for the online version) but for most parts we tried to provide generic explanations that should be useful for a long time to […]

  • Topic

    11.5. Summary

    11.5. Summary In this chapter, we took a brief look at Kali’s role in the field of information security. We discussed the importance of a clean, working installation and the use of encryption before heading out to the field in order to protect your client’s information, and the importance of legal representation to protect you and […]

  • Topic

    Types of Attacks

    11.4. Types of Attacks Once the work is taking place, what are some of the specific sorts of attacks that you will be conducting? Each type of vulnerability has its own associated exploitation techniques. This section will cover the various classes of vulnerabilities that you will interact with most often. No matter what category of […]

  • Topic

    Formalization of the Assessment

    11.3. Formalization of the Assessment With your Kali environment ready and the type of assessment defined, you are almost ready to start working. Your last step is to formalize the work to be done. This is critically important, as this defines what the expectations for the work will be, and grants you permission to conduct what […]

  • Topic

    Types of assessments

    11.2. Types of Assessments Now that you have ensured that your Kali environment is ready, the next step is defining exactly what sort of assessment you are conducting. At the highest level, we may describe four types of assessments: a vulnerability assessment, a compliance test, a traditional penetration test, and an application assessment. An engagement […]

  • Topic

    Kali Linux in an Assessment

    11.1. Kali Linux in an Assessment When preparing to use Kali Linux in the field, you must first ensure you have a clean, working installation. A common mistake that many novice security professionals make is using a single installation across multiple assessments. This is a problem for two primary reasons: Over the course of an assessment, […]

  • Topic

    10.4. Summary

    10.4. Summary Kali Linux scales beyond the desktop to medium or large scale deployments and even to the enterprise level. In this chapter, we covered how to centralize management of multiple Kali installations with SaltStack, allowing you to quickly deploy highly secure Kali systems preconfigured for your specific needs. We also revealed how you can […]

  • Topic

    Extending and Customizing Kali

    10.3. Extending and Customizing Kali Linux Sometimes you need to modify Kali Linux to make it fit your local needs. The best way to achieve this is to maintain your own package repository hosting the modified versions of the Kali packages that you had to fork, as well as supplementary packages providing custom configuration and […]

  • Topic

    Leveraging Configuration Management

    10.2. Leveraging Configuration Management With the ability to install Kali on multiple computers very quickly, you will need some help in managing those machines post-installation. You can leverage configuration management tools to manage machines or configure replacement computers to any desired state. Kali Linux contains many popular configuration management tools that you might want to […]