Kali Linux Cookbook and over 2 million other books are available for Amazon Kindle . Learn more
£25.21
  • RRP: £25.99
  • You Save: £0.78 (3%)
FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Kali Linux Cookbook has been added to your Basket
Trade in your item
Get a £6.56
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Kali Linux Cookbook Paperback – 14 Sep 2013


See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£25.21
£25.18 £25.83
£25.21 FREE Delivery in the UK. In stock. Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

Kali Linux Cookbook + Web Penetration Testing with Kali Linux + The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Price For All Three: £66.66

Buy the selected items together


Trade In this Item for up to £6.56
Trade in Kali Linux Cookbook for an Amazon Gift Card of up to £6.56, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Paperback: 260 pages
  • Publisher: Packt Publishing (14 Sept. 2013)
  • Language: English
  • ISBN-10: 1783289597
  • ISBN-13: 978-1783289592
  • Product Dimensions: 19 x 1.5 x 23.5 cm
  • Average Customer Review: 3.2 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Bestsellers Rank: 308,292 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Product Description

About the Author

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

3.2 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

Format: Paperback
At a glance Kali Linux Cookbook looks like a more complete book into Kali Linux. I began reading the book and I was happy to see that it started off talking to you about how to install Kali Linux. The best thing is the author demonstrates this using Virtual Box where in the past they have used VMWare Workstation. Of course both are good, but virtual box is free. I also noticed that the author makes sure that the reader doesn't have to spend additional money to follow on with the book.

This book is much more advanced than other books I've read on Kali Linux. It goes way more In depth even on the setup of Kali. With this book being all about pentesting and forensics the author also tells you how to get additional operating systems to pentest and practice on. I was very impressed.

The book follows a format that is very helpful. It is sectioned up into different methods. These sections have names, about, getting ready and a how to for each method. This is ideal if you don't want to read the full book but just want to look at individual sections which are clearly shown.

This book covers all kinds of pentests using the likes of nmap, network mapping, finding vulnerabilities and exploiting them. It's perfect for beginners and also advanced users if you need to refer to something quickly.

If you are looking for a Kali Linux book to get you started and familiar with tools such as nmap and metasploit then this is the book for you. I highly recommend it and this book gets a 5* from me. Purchase this book!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By W Boudville on 8 Dec. 2013
Format: Paperback
Hmm. Penetration testing. Hmm. The back cover sounds very suggestive; like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat justifiably dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Kindle Edition Verified Purchase
Struggling to read the whole thing and give a meaningful review due to the very poor formatting of the Kindle edition. That is the main reason for 1 star. Clearly nobody proof read this before putting it to market in electonic form. I don't think I have had one single page yet that has not had a visual issue on it. The pages are messed up, boxes misaligned, page breaks wrong, carriage returns in middle of lines or even words. I have even had a few pages (mainly ones with images on) that just wont turn the page, so I have had to resort in going ahead in the book, and then paging backwards to where I wanted to be. It really is quite terrible and should be urgently pulled from sale and corrected, and then applied as an update to those who have already purchased it. I really should ask for a refund.

I would suggest that if you want this book at the time of this review, you should get the printed version and avoid the Kindle one until they fix it and make it actually readable. Note - I tried this on the Android Kindle app on my xperia Z2, and it was no better at all.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
This book gives clear instructions on how to perform various tests with Kali (for example, the commands to perform a particular Metasploit exploit injection, or the flags to put with an Nmap scan to perform a Syn/Syn Ack scan) but it dosnt really say why you should do it. I think it would be better for people with less of a background in penetration testing to buy this book alongside a book explaining why they should be doing the things the book tells them to do. For example, get an explanation of what we want to accomplish with Banner Enumeration, and then read the 'recipe' in the cookbook for a type of banner grabbing scan.
For me, though, its perfect. If I know I need to perform a Christmas Tree scan I can flick to the particular recipe and instantly jog my memory on the flags I need to issue to get than particular NMAP function.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Kindle Edition Verified Purchase
The first part of the book is almost unreadable on a Kindle and an iPad. The content might be good but I havent really got that far as reading a word with one letter per line, pictures placed over text or formatting that changes page to page isn't a great way to read. Sort out the formatting as an update and I'll review the two stars. Shame, I was looking forward to reading this.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again


Feedback