• Useful Resources
  • Useful Resources | 35 CHAPTER 2
  • | Chapter 1: Foundations of Kali Linux




    Download 22,59 Mb.
    Pdf ko'rish
    bet40/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   36   37   38   39   40   41   42   43   ...   225
    Bog'liq
    learningkalilinux

    34 | Chapter 1: Foundations of Kali Linux


    • Unix is an environment created by programmers for programmers using the
    command line.
    • Unix was created with simple, single-purpose tools that can be combined for
    more complex tasks.
    • Kali Linux has several potential GUIs that can be installed and utilized; it’s
    important to find one that you’re most comfortable with.
    • Each desktop environment has a lot of customization options.
    • Kali is based on 
    systemd
    , so service management uses 
    systemctl
    .
    • Processes can be managed using signals, including interrupt and kill.
    • Logs will be your friends and help you troubleshoot errors. Logs are typically
    stored in 
    /var/log
    .
    • Configuration files are typically stored in 
    /etc
    , though individual configuration
    files are stored in the home directory.
    Useful Resources

    Linux in a Nutshell
    , 6e
    , by Ellen Siever, Stephen Figgins, Robert Love, and Arnold
    Robbins (O’Reilly, 2009)

    Linux System Administration
    , by Tom Adelstein and Bill Lubanovic (O’Reilly,
    2009)
    • The Kali Linux 
    website

    “Linux System Administration Basics”
    by Linode
    Useful Resources | 35



    CHAPTER 2
    Network Security Testing Basics
    Security testing
    is a broad term that means a lot of different things. Some of this test‐
    ing will be network-based, and the goal may not necessarily be about system compro‐
    mise. Instead, the testing may be more focused on impacting the service in negative
    ways, like causing the service to stop or be otherwise unavailable. When a service is
    taken offline, it’s considered a security issue. Because of that, stress testing can be an
    important element of security testing.
    To perform network-based testing in which you are testing more of the networking
    elements than the applications, you need to understand how network protocol stacks
    are defined. One way of defining protocols and, more specifically, their interactions,
    is using the Open Systems Interconnection (OSI) model. Using the OSI model, we
    can break the communications into different functional elements and see clearly
    where different pieces of information are added to the network packets as they are
    being created. Additionally, you can see the interaction from system to system across
    the functional elements.
    Stress testing not only creates a lot of information for the systems and applications to
    handle, but also generates data the application may not expect. You can perform
    stress testing, and should, by deliberately breaking the rules that the application or
    operating system expects communications should follow. Many attacks use this rule-
    breaking. They can cause application failures, either by getting them to shut down or
    by causing application exceptions that may be exploited for application or system
    compromise.

    Download 22,59 Mb.
    1   ...   36   37   38   39   40   41   42   43   ...   225




    Download 22,59 Mb.
    Pdf ko'rish