Deliver to your Kindle or other device

 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.
Kali Linux Cookbook
 
 

Kali Linux Cookbook [Kindle Edition]

Willie L. Pritchett , David De Smet
4.2 out of 5 stars  See all reviews (4 customer reviews)

Print List Price: £25.99
Kindle Price: £9.26 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £16.73 (64%)
* Unlike print books, digital books are subject to VAT.

Formats

Amazon Price New from Used from
Kindle Edition £9.26  
Paperback £25.21  
Kindle Daily Deal
Kindle Daily Deal: At least 60% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.

Special Offers and Product Promotions

  • Purchase any Kindle Book sold by Amazon.co.uk and receive £1 credit to try out our Digital Music Store. Here's how (terms and conditions apply)


Product Description

Product Description

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

Approach

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

About the Author

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


Product details

  • Format: Kindle Edition
  • File Size: 31897 KB
  • Print Length: 262 pages
  • Page Numbers Source ISBN: 1783289597
  • Publisher: Packt Publishing (15 Oct 2013)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B00FXJCWYU
  • Text-to-Speech: Enabled
  • X-Ray:
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Bestsellers Rank: #120,207 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


More About the Authors

Discover books, learn about writers, and more.

What Other Items Do Customers Buy After Viewing This Item?


Customer Reviews

3 star
0
2 star
0
1 star
0
4.2 out of 5 stars
4.2 out of 5 stars
Most Helpful Customer Reviews
4.0 out of 5 stars Clear concise instructions, but no information 4 April 2014
By Brewer
Format:Paperback|Verified Purchase
This book gives clear instructions on how to perform various tests with Kali (for example, the commands to perform a particular Metasploit exploit injection, or the flags to put with an Nmap scan to perform a Syn/Syn Ack scan) but it dosnt really say why you should do it. I think it would be better for people with less of a background in penetration testing to buy this book alongside a book explaining why they should be doing the things the book tells them to do. For example, get an explanation of what we want to accomplish with Banner Enumeration, and then read the 'recipe' in the cookbook for a type of banner grabbing scan.
For me, though, its perfect. If I know I need to perform a Christmas Tree scan I can flick to the particular recipe and instantly jog my memory on the flags I need to issue to get than particular NMAP function.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars good book well presented 27 Feb 2014
By dean
Format:Kindle Edition|Verified Purchase
i'd suggest you could find most/all of the content of this book via Google if you had the time.
Good book, well laid out and easy to read.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Book Review: Kali Linux Cookbook 30 Dec 2013
Format:Paperback
At a glance Kali Linux Cookbook looks like a more complete book into Kali Linux. I began reading the book and I was happy to see that it started off talking to you about how to install Kali Linux. The best thing is the author demonstrates this using Virtual Box where in the past they have used VMWare Workstation. Of course both are good, but virtual box is free. I also noticed that the author makes sure that the reader doesn't have to spend additional money to follow on with the book.

This book is much more advanced than other books I've read on Kali Linux. It goes way more In depth even on the setup of Kali. With this book being all about pentesting and forensics the author also tells you how to get additional operating systems to pentest and practice on. I was very impressed.

The book follows a format that is very helpful. It is sectioned up into different methods. These sections have names, about, getting ready and a how to for each method. This is ideal if you don't want to read the full book but just want to look at individual sections which are clearly shown.

This book covers all kinds of pentests using the likes of nmap, network mapping, finding vulnerabilities and exploiting them. It's perfect for beginners and also advanced users if you need to refer to something quickly.

If you are looking for a Kali Linux book to get you started and familiar with tools such as nmap and metasploit then this is the book for you. I highly recommend it and this book gets a 5* from me. Purchase this book!
Comment | 
Was this review helpful to you?
4.0 out of 5 stars surveys field 8 Dec 2013
Format:Paperback
Hmm. Penetration testing. Hmm. The back cover sounds very suggestive; like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat justifiably dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 1.6 out of 5 stars  5 reviews
3 of 3 people found the following review helpful
1.0 out of 5 stars Kali LInux Cookbooks 20 Feb 2014
By Jurandir - Published on Amazon.com
Format:Paperback|Verified Purchase
The examples do not match, there are many mistakes... wrote to the author, no reply... disappointed !

I really expected more...
2 of 2 people found the following review helpful
2.0 out of 5 stars There are better options with better writing 9 Feb 2014
By Amazon Customer - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
Nothing is explained, horrible writing with plenty of errors. Save your money and look at some other similar books on Kali.
3 of 4 people found the following review helpful
1.0 out of 5 stars Move along, this is not the Kali Linux book you are looking for. 24 Jan 2014
By Amazon Customer - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
Poorly written !!!

"How it works..." sections explain nothing.

Complex commands are presented with no background or explanation of their purpose or arguments.

If I could return this book, I would.

A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.

As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
2.0 out of 5 stars Kali Linux 29 Mar 2014
By Torrez - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
This particular book does not detail the recipes enough with explanation to what's going on it seems to skim over a lot of details...Still searching for something superior to this ...
2.0 out of 5 stars surveys the field 8 Dec 2013
By W Boudville - Published on Amazon.com
Format:Paperback
The back cover sounds like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category