OK
About Daniel W. Dieterle
For about the last 9 years Daniel has been completely focused on security as a computer security researcher & author. His articles have been published in international security magazines, and referenced by both technical entities and the media. His Kali Linux based books are used worldwide as a teaching & training resource for universities, technical training centers, government and private sector organizations. Daniel has assisted with creating numerous security training classes and technical training books mainly based on Ethical Hacking & Kali Linux, and enjoys helping out those new to the field.
Customers Also Bought Items By
Are you an author?
Author Updates
-
-
Blog postAlleged Russian backed hack “virtually a declaration of war by Russia on the United States,” claims US Senator Dick Durbin – I always kind of shake my head a little bit when I read political quotes like this. In this post I will explain why.
I have been asked a lot about the “SolarWinds” hack, so I thought I would throw my two cents in. Whenever a “Nation State” hack is exposed, it is always met with feigned shock and outrage from government leaders. Our government agencies act6 months ago Read more -
Blog postThe Pi 400 makes creating a hacking system with Raspberry Pi extremely simple – it is literally burn, boot and done!
The Pi 400 is an “all in one” keyboard version of the Raspberry Pi 4. For all intents and purposes, it is a Raspberry Pi 4, though it has been flattened out a bit and the circuitry has been modified to reflect the changes. The Pi 400 is perfect as a hacking system, as you can easily install and use a fully function version of Kali Linux on it.
In this article,6 months ago Read more -
Blog postAlmost every time you sign up for an online event, you get one of those wonderful calendar reminders to set an appointment reminder. In this article we will take a look at using “evil” calendar .ics files in a pentesting or Red Team credential grabbing attack. Crafting the E-Mail The first thing we need to … Continue reading "Initial Access with Evil Calendar Files and GoPhish"7 months ago Read more
-
Blog postThe latest version of Kali Linux 2020.4 dropped this week. Let’s take a quick look!
At first glance it seems like mostly visual changes – Love it or hate it, they switched to the ZSH shell by default. If you are not used to it, it is a little disorientating at first, but you get used to it quick.
Kali is now using Metasploit Framework 6 which has some nice updates that I really like. I did a demo of the MSF 6 Docker to Host bypass demo a while back for my Instagram followers.7 months ago Read more -
Blog postThe Raspberry Pi is a small yet power platform that is perfect for building a cost effective cybersecurity training lab. In this article we will look at installing Docker on a Raspberry Pi 4 (4GB) running Kali Linux (64 bit). The case pictured is the Official Raspberry Pi 7″ touchscreen in a modified touchscreen case. … Continue reading "Cheap Security Lab Training with Raspberry Pi 4, Docker & Kali Linux"11 months ago Read more
Kali Linux (2018) is an Ethical Hacking platform that allows security professionals to use the same tools and techniques that a hacker would use, so they can find security issues before the attackers do.
In Basic Security Testing with Kali Linux, you will learn basic examples of how hackers find out information about your company, find weaknesses in your security, how they gain access to your systems, and most importantly, how to stop them.
Completely updated for 2018, this hands on step-by-step guide covers:
- Kali Linux Overview & Usage
- Shodan (the “Hacker’s Google”)
- Metasploit Tutorials
- Exploiting Windows and Linux Systems
- Escalating Privileges in Windows
- Cracking Passwords and Obtaining Clear Text Passwords
- Wi-Fi Attacks
- Kali on a Raspberry Pi & Android
- Securing your Network
- And Much More!
Though no computer can be completely “Hacker Proof” knowing how an attacker works will help put you on the right track of better securing your network!
Want to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Want to learn how to make cheap drop boxes? Or how to use a Raspberry Pi as a HiD attack device or for Physical Security?
Look no further, this book is for you!
Topics Include:
- Using Kali Linux and Kali-Pi on an RPi
- Using Ethical Hacking tools in Raspbian
- Using Raspberry Pi as a target in a Pentest lab
- Using RPi as a USB HiD attack device
- Using cameras on a RPi to create physical security devices
And much, much more!
Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do.
In Basic Security Testing with Kali Linux 2, you will learn basic examples of how hackers find out information about your company, find weaknesses in your security and how they gain access to your system.
Completely updated for 2016, this step-by-step guide covers:
- Kali Linux Introduction and Overview
- Shodan (the “Hacker’s Google”)
- Metasploit Tutorials
- Exploiting Windows and Linux Systems
- Escalating Privileges in Windows
- Cracking Passwords and Obtaining Clear Text Passwords
- Wi-Fi Attacks
- Kali on a Raspberry Pi
- Securing your Network
- And Much More!
Though no computer can be completely “Hacker Proof” knowing how an attacker works will help put you on the right track of better securing your network!
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Linux on a supported Android device. In Security Testing with Kali NetHunter, you will see the basic usage of NetHunter as we walk through the entire NetHunter tool menu, and learn by doing with hands on step-by-step tutorials.
Topics Include:
- Kali NetHunter Introduction and Overview
- Shodan App (the “Hacker’s Google”)
- Using cSploit & DriveDroid
- Exploiting Windows and Linux Systems
- Human Interface Device Attacks
- Man-in-the-Middle Attacks
- Wi-Fi Attacks
- Metasploit Payload Generator
- Using NetHunter with a WiFi Pineapple Nano
NetHunter not only brings the power of Kali Linux to a portable device, it also brings an inherent level of stealth to Ethical Hackers and Pentesters by the very fact that smartphones are in use everywhere.
Kali Linux 2 is the most advanced and feature rich penetration testing platform available. This hands-on learn by doing book will help take you beyond the basic features of Kali into a more advanced understanding of the tools and techniques used in security testing.
If you have a basic understanding of Kali and want to learn more, or if you want to learn more advanced techniques, then this book is for you.
Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find and correct security issues before the bad guys detect them. As a follow up to the popular “Basic Security Testing with Kali Linux” book, this work picks up where the first left off.
Topics Include
- What is new in Kali 2?
- New Metasploit Features and Commands
- Creating Shells with Msfvenom
- Post Modules & Railgun
- PowerShell for Post Exploitation
- Web Application Pentesting
- How to use Burp Suite
- Security Testing Android Devices
- Forensics Tools for Security Testing
- Security Testing an Internet of Things (IoT) Device
- And much more!