J
journal,
60
journalctl,
60
K
Kali Linux
communities,
132
documentation,
131
download,
14
features,
8
getting started,
14
history,
2
metapackages,
243
policies,
10
relationship with Debian,
4
repositories,
179
kali-archive-keyring,
208
kali-defaults,
269
kali-dev,
4
,
180
kali-linux-* metapackages,
243
kali-menu,
269
kali-meta,
269
kali-rolling,
4
,
179
kali.org/docs/,
131
KDE,
3
kernel,
48
compilation,
237
configuration,
239
logs,
60
sources,
238
key
APT’s authentication keys,
209
USB key,
19
keyboard layout,
69
kill,
57
konqueror,
130
KVM,
24
L
language selection,
67
layout, keyboard,
69
less,
56
libapache-mod-php,
118
Linux,
48
distribution,
2
kernel,
2
,
9
kernel sources,
238
live ISO image,
14
custom build,
241
live-boot,
245
live-build,
241
adding files,
245
debconf preseeding,
244
hooks,
245
packages to install,
243
loader
bootloader,
85
LOG,
161
logcheck,
167
logging,
167
313
Index
Logical Volume Manager,
89
login, remote login,
115
logs
aptitude,
199
dpkg,
194
journal,
60
kernel,
60
monitoring,
167
ls,
52
lsdev,
61
lshw,
61
lspci,
61
lspcmcia,
61
lsusb,
61
LUKS,
89
LVM,
89
M
machine, virtual machine,
24
main, section,
179
make deb-pkg,
241
Makefile,
272
man,
128
management
configuration management,
261
of services,
121
manual pages,
128
manually installed packages,
205
mask
rights mask,
59
MASQUERADE,
161
master boot record,
87
master, salt master,
261
MD5,
169
md5sums,
220
memory corruption,
299
menu, Kali Linux’s applications menu,
6
metapackage,
213
,
215
kali-linux-*,
243
metapackages,
85
Metasploit Unleashed,
307
minion, salt minion,
261
mirrors,
14
,
180
mkdir,
53
mkfs,
49
modification of a package,
228
modification, right,
57
monitoring,
167
activity,
168
files,
170
log files,
167
more,
56
mount,
49
mount point,
82
Multi-Arch,
206
multi-user.target,
122
MultiViews, Apache directive,
120
mv,
53
N
netfilter,
159
network configuration,
71
,
108
with ifupdown,
109
with NetworkManager,
108
with systemd-network,
110
network installation,
258
network preseed,
97
network services,
10
securing,
159
NetworkManager,
108
newgrp,
58
,
113
NEWS.Debian.gz,
130
non-free, section,
179
nuke password,
250
O
octal representation of rights,
59
Offensive Security,
2
openssh-server,
115
Options, Apache directive,
119
OUTPUT,
160
overflow, buffer,
299
overlay filesystem,
246
owner
314
Kali Linux Revealed
group,
57
user,
57
P
package
authenticity check,
208
binary package,
176
build,
236
configuration,
269
conflict,
214
content inspection,
189
Debian package,
176
dependency,
212
file list,
187
header list,
190
incompatibility,
214
info,
190
installation,
182
,
183
making changes,
232
meta-information,
210
,
211
modification,
228
priority,
202
purge,
187
removal,
183
,
186
replacement,
216
repository,
275
seal,
208
search,
188
,
191
signature,
208
source of,
178
source package,
176
status,
188
unpacking,
182
version comparison,
190
virtual package,
215
package tracker,
5
Packages.xz,
178
packaging
build options,
234
configuration packages,
269
new upstream version,
235
packet
filter,
159
IP,
159
PAE (Physical Address Extension),
36
parted,
247
partition
encrypted,
88
swap partition,
82
partitioning,
75
guided partitioning,
75
manual partitioning,
79
passwd,
113
password,
113
attacks,
300
default passwords,
159
policy,
158
password attacks,
7
patch,
233
patch application,
233
PATH,
53
PCI,
292
penetration test
compliance,
292
traditional,
293
penetration testing,
5
penetration testing course,
307
permissions,
57
persistence,
246
encrypted,
248
multiple stores,
249
pg_createcluster,
117
pg_ctlcluster,
117
pg_dropcluster,
117
pg_hba.conf,
116
pg_lsclusters,
117
pg_renamecluster,
117
pg_upgradecluster,
117
PGP key,
17
PHP,
118
PID, process identifier,
50
Pin,
204
Pin-Priority,
204
315
Index
pinfo,
130
ping,
162
pinning, APT pinning,
202
point, mount point,
82
post exploitation,
7
PostgreSQL,
115
postinst,
217
postrm,
217
POSTROUTING,
160
pre-dependency,
213
Pre-Depends, header field,
213
preferences,
202
preinst,
217
prerm,
217
PREROUTING,
160
preseed file,
97
preseeding debian-installer,
96
priority
package priority,
202
program
configuration,
114
Provides, header field,
215
proxy,
84
proxy cache,
84
ps,
57
puppet,
261
purge of a package,
187
purging a package,
187
pwd,
52
PXE boot,
258
Q
QCOW,
30
QEMU,
24
R
read, right,
57
README.Debian,
130
receive buffer,
162
Recommends, header field,
214
REDIRECT,
161
redirection,
56
reinstallation,
194
REJECT,
161
Release.gpg,
208
remote login,
115
removal of a package,
183
removing a package,
186
replacement,
216
Replaces, header field,
216
report a bug,
134
reportbug,
143
reporting tools,
7
repository of packages,
275
reprepro,
275
Require, Apache directive,
121
requirements, minimal installation require-
ments,
66
rescue mode of installer,
87
resize a partition,
80
retrieve the sources,
229
reverse engineering,
7
rights,
57
mask,
59
octal representation,
59
risk model,
156
risk ratings,
290
rkhunter,
171
rm,
53
rmdir,
53
Rolling, Kali Rolling,
3
root password,
159
RTFM,
128
rules file,
273
S
salt execution modules,
262
salt formulas,
264
salt state modules,
265
salt states,
264
salt-key,
261
saltstack,
261
samhain,
170
scanning threads,
290
316
Kali Linux Revealed
Schneier, Bruce,
156
search of packages,
191
section
contrib,
179
main,
179
non-free,
179
secure boot,
24
secure ssh,
159
securing,
156
a laptop,
158
a server,
158
network services,
159
security
assessments,
284
auditing,
5
policy,
156
service file, systemd service file,
122
services management,
121
setgid directory,
58
setgid, right,
58
setuid, right,
58
Setup,
24
sg,
113
SHA1,
169
SHA256SUMS,
17
shell,
52
shrink a partition,
80
signal,
57
signature
package signature,
208
SNAT,
161
sniffing,
7
social engineering tools,
7
source
of packages,
178
of the Linux kernel,
238
package,
176
retrieval,
229
source package
build,
236
making changes,
232
sources.list,
178
Sources.xz,
178
spoofing,
7
SQL injection,
300
SSH,
115
ssh service,
159
SSL,
118
state modules, salt,
265
sticky bit,
58
sudo,
109
Suggests, header field,
214
swap,
82
swap partition,
82
SymLinksIfOwnerMatch, Apache directive,
120
synaptic,
196
,
199
system administration,
307
system, file system,
49
systemctl,
121
systemd,
121
systemd-network,
110
systemd-resolved,
111
T
target, systemd target,
122
TFTP,
258
tftpd-hpa,
258
threat model,
156
TLS,
118
top,
168
tracker
package tracker,
5
traditional penetration test,
293
training,
306
tripwire,
170
troubleshooting installations,
99
trust, web of trust,
18
trusted key,
209
U
UEFI,
24
ULOG,
161
umask,
59
317
Index
uname,
60
unattended installation,
95
union mount,
246
unit, systemd unit,
121
unpacking
binary package,
182
upgrade
handling problems after an upgrade,
193
system upgrade,
184
upstream version, packaging a new one,
235
USB key,
19
user
owner,
57
user creation,
72
user space,
48
V
variable, environment,
54
variants of live ISO image,
242
VDI,
30
version, comparison,
190
vigr,
112
vipw,
112
virtual host,
118
virtual machine,
24
virtual memory,
82
virtual package,
215
VirtualBox,
24
VMware,
24
volume
group,
89
logical volume,
89
physical volume,
89
vulnerability
analysis,
6
assessments,
288
client side,
301
denial of service,
298
memory corruption,
299
password,
300
scans,
290
types of,
298
web,
300
W
WantedBy, systemd directive,
122
Wants, systemd directive,
122
web access restriction,
121
web application analysis,
6
web attacks,
300
web authentication,
120
web of trust,
18
web server,
118
Win32 Disk Imager,
19
wireless attacks,
7
write, right,
57
|