Mastering Kali Linux for Web Penetration Testing

What you need for this book

  • Hardware list:

The exercises performed in this book and the tools used can be deployed on any modern Windows, Linux, or Mac OS machine capable of running a suitable virtualization platform and a more recent version of the OS. Suggested minimum requirements should allow for at least the following resources to be available to your virtual platforms:

  • 4 virtual CPUs
  • 4-8 GB of RAM
  • 802.3 Gigabit Ethernet, shared with host machine
  • 802.11a/g/n/ac WiFi link, shared with host machine
  1. Software list:

Desktop/Laptop Core OS and Hypervisor:
Virtualization should be provided by one of Kali Linux's supported hypervisors, namely one of the following options. The operating system and hardware will need to support the minimum requirements, with an eye toward dedicating the previous hardware recommendations to the guest virtual machines:

  • For Windows:

VMware Workstation Pro 12 or newer (Player does not support multiple VMs at a time)--

VirtualBox 5.1 or newer--

  • For Mac OS:

VMware Fusion 7.X or newer--

Parallels 12 for Mac--

VirtualBox 5.1 or newer--

  • For Linux:

VMWare Workstation 12 or newer (Player does not support multiple VMs at a time)--

VirtualBox 5.1 or newer--

  • For Barebones Hypervisors:

VMware ESXi/vSphere 5.5 or newer

Microsoft Hyper-V 2016

Redhat KVM/sVirt 5 or newer

  • Applications and virtual machines:

  • Essential:

Kali Linux VM (choose 64-bit VM, Vbox, or Hyper-V image)--

  • Alternatives:

Kali Linux ISO (64 bit, for Virtual-Box or Parallels)--

  • Target VMs:

OWASP Broken Web Application:

Metasploitable 2--

Metasploitable 3--

Bee Box--

Damn Vulnerable Web Application (DVWA)--
Mutillidae 2--

Windows Eval Mode OS + Browser--

Also, Subscribe to my youtube channel