Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Kindle Price: £20.39

Save £7.60 (27%)

includes VAT*
* Unlike print books, digital books are subject to VAT.

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

BackTrack 5 Cookbook by [Pritchett, Willie, Smet, David De]
Kindle App Ad

BackTrack 5 Cookbook Kindle Edition

4.7 out of 5 stars 3 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
£20.39

Kindle Books from 99p
Load up your Kindle library before your next holiday -- browse over 500 Kindle Books on sale from 99p until 31 August, 2016. Shop now

Product Description

About the Author

Willie Pritchett

Willie Pritchett, MBA, is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure and data-driven application development and also in staffing services. He has worked with state and local government agencies, as well as helped many small businesses reach their goals through technology.

Willie has several industry certifications and currently trains students on various topics, including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design.

He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


Product details

  • Format: Kindle Edition
  • File Size: 53856 KB
  • Print Length: 298 pages
  • Publisher: Packt Publishing (21 Dec. 2012)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B00ATM05RW
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Enabled
  • Average Customer Review: 4.7 out of 5 stars 3 customer reviews
  • Amazon Bestsellers Rank: #599,857 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?

Customer Reviews

4.7 out of 5 stars
5 star
2
4 star
1
3 star
0
2 star
0
1 star
0
See all 3 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
BackTrack 5 seems best suited for a very experienced linux or unix user. One who also has sysadmin background. You get an indication of this by the second chapter. It commences by explaining how to get and use kernel headers in compiling code. The kernel headers are the source code of the linux kernel itself. Another indicator is the next topic, about installing Broadcom wireless drivers. It turns out these days that a lot of computer breakins happen via wireless networks.

The book educates you on a potentially useful tool - Maltego, for threat assessment. But perhaps more apropos is the discussion on how to use Nessus. This is a common and powerful tool for finding vulnerabilities. The Nessus screen captures give you some appreciation of the many options available within it. It is ecumenical. It can detect flaws in Microsoft and linux systems and the text explains both cases.

A variant of Nessus is also explored - OpenVAS. It has the advantage of being free, unlike Nessus which charges for professional use.

Chapter 5 may be problematic to some users. It describes how to exploit vulnerabilities. Other sections of the book are about finding these. But the intellectual defence of chapter 5 is that a sysadmin can get to appreciate how a black hat might come into her system, thus giving incentive for the sysadmin to patch flaws. Even so, be careful when or if you apply this chapter. This can be like running the password breaker Crack. In some companies, doing the latter in an unauthorised way is grounds for dismissal. Likewise if using the exploitations in chapter 5, especially against a system that is not your company's.
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Certainly showed me how to protect my network and how hackers can get in will certainly keep referring to this as and when needed
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
Get the inside on modern hacking with this useful guide! Essential reading for cyber freaks!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 3.9 out of 5 stars 18 reviews
9 of 9 people found the following review helpful
3.0 out of 5 stars Walks you through the steps, introduces a lot of tools 14 Feb. 2013
By Richard J. Wagner - Published on Amazon.com
Format: Paperback
This book is written in the Packt 'Cookbook' format. This means it doesn't contain a lot of theory or in-depth explanations. Rather, it contains lots of snippets telling you what to type and where to click. Most sections contain the headings:
Using (Some feature) - Tells a little about which tool you are about to use
Getting Ready - The prerequisites for using the specified utility
How to do it - Screenshots and script instructions for running the utility
How it works - A small explanation of what was done
There's more - additional explanations

To repeat that, this book is really a collection of short sections that describe how you can use various utilities in a dedicated Linux distro. So, what are the contents?

- Installing and customizing BackTrack
- Information Gathering
- Vulnerability identification
- Exploitation
- Privilege Escalation
- Wireless Networks
- Voice Over IP
- Password Cracking
- Forensics

The chapter on Forensics can serve a dual purpose. Besides helping with ethical penetration testing, this one also offers some interesting processes for other useful work: data recovery (damaged drives or deleted files) and password recovery. These can surely be useful in everyday situations.

The book contains an important warning: Used improperly, some of these tools may bring you to the attention of law enforcement agencies. But if you think carefully and act prudently, this book can be of use to someone validating their electronic defenses.
7 of 7 people found the following review helpful
4.0 out of 5 stars Good book - helped me out! 19 Feb. 2013
By L. Fesenden - Published on Amazon.com
Format: Paperback
You know, sometimes, just sometimes something fortuitous happens to me. This was one of those times.
I was contacted by my friends over at Pakt Publishing to review their new book on BackTrack. Of course I said sure. Hey, I am a Linux junkie after all! It had actually been quite a while since I had played with BackTrack and this gave me *just* the incentive I needed, but let me tell you a bit about the book...

The book is a "cookbook" style book which gives you "recipes" or guided examples of common problems/scenarios and their fixes. The book is well written, a good reference for a pro, and a great tutorial for the beginner, and by beginner I am assuming that the person *does* have Linux experience, just not BackTrack experience as some command line comfort is pretty much a necessity for this kind of work. The first 2 chapters start you out exactly the way they should, by installing and customizing the distribution. What they don't tell you is it takes a good while to actually download the distro, but that is beside the point.

Once you actually get things running well, you can follow the book through some really decent examples from Information Gathering all the way through Forensics. The book covers all matter of subject matter and applications in between such as using NMAP, Nessus, Metaspolit, UCSniff and more. I mentioned that this was fortuitous for me and that was because one of the things the book covered was the Hydra program, and, as it turns out, that was the perfect tool for me to use in remediating some password synchronization issues across several hundred servers.

Anyone using a computer should have at least a basic understanding about keeping their valuable data safe, whether that data is for a multi-million dollar company or your own invaluable family photographs. This book goes to great efforts to not only explain how to detect, analyze and remedy such issues, but also gives important background about just how systems become vulnerable to begin with. If only for that reason alone, it's worth the read. If you are actually a sysadmin, this information is a must. For $23 for the ebook version, it's a no brainer. Good book. It helped me out and I'll wager that if you give it a read it'll do the same for you!
4 of 4 people found the following review helpful
4.0 out of 5 stars be very careful about doing exploitations 3 Feb. 2013
By W Boudville - Published on Amazon.com
Format: Paperback
BackTrack 5 seems best suited for a very experienced linux or unix user. One who also has sysadmin background. You get an indication of this by the second chapter. It commences by explaining how to get and use kernel headers in compiling code. The kernel headers are the source code of the linux kernel itself. Another indicator is the next topic, about installing Broadcom wireless drivers. It turns out these days that a lot of computer breakins happen via wireless networks.

The book educates you on a potentially useful tool - Maltego, for threat assessment. But perhaps more apropos is the discussion on how to use Nessus. This is a common and powerful tool for finding vulnerabilities. The Nessus screen captures give you some appreciation of the many options available within it. It is ecumenical. It can detect flaws in Microsoft and linux systems and the text explains both cases.

A variant of Nessus is also explored - OpenVAS. It has the advantage of being free, unlike Nessus which charges for professional use.

Chapter 5 may be problematic to some users. It describes how to exploit vulnerabilities. Other sections of the book are about finding these. But the intellectual defence of chapter 5 is that a sysadmin can get to appreciate how a black hat might come into her system, thus giving incentive for the sysadmin to patch flaws. Even so, be careful when or if you apply this chapter. This can be like running the password breaker Crack. In some companies, doing the latter in an unauthorised way is grounds for dismissal. Likewise if using the exploitations in chapter 5, especially against a system that is not your company's.
5.0 out of 5 stars A good book for BackTrack 5 Jan. 2015
By Michael R. Kruger - Published on Amazon.com
Format: Paperback Verified Purchase
This is a good book for a neophyte like me. I like the "Getting Ready", "How It Works", and "How to Do It" approach. It's not just take these steps. Full of "Why's" and "How's".
2 of 2 people found the following review helpful
2.0 out of 5 stars These Recipes will not make you a chef nor will they make you look like one 26 Aug. 2013
By R1d3r - Published on Amazon.com
Format: Kindle Edition
I'm not sure if I was just expecting too much from this book or if other readers are just not that much of a stickler about certain things but when I see that many errors (!), misspellings, inconsistencies, repetitions and simplifications of an actually quite complex topic, I start to believe that the author was just out there to make some easy money.

I was very disappointed with this book. I was pretty excited after reading all the somewhat positive reviews and I've read other "cookbook" style books before. It's definitely not the style. I was not expecting a book that explains every detail about a certain process but I was also not expecting a book that leaves out crucial steps in a process (e.g. how to get mon0 up and running for wireless hacking and that mon0 and wlan0 and not exactly the same things or simply different wireless cards like the author makes it seem). I think it's important if you want to understand that hack that you understand that you need to put your card into promiscuous mode. That could've been explained in one or two sentences but instead lots of repetitions of "requirements" that would've been enough to be mentioned once.

Also a lot of the "hacks" are portrayed to be much simpler than they actually are in real life and that's ok if the author makes the reader aware of the pitfalls and difficulties of a certain hack (I'm aware that there can't be a one-size-fits-all instruction) but this book is incorrectly giving the impression that some things are just as easy as adding a few lines in a command line and that's it. i'm sure that's good for selling books and may appease the novice hacker but only until they actually try it out in their lab.
unfortunately I returned the book and don't have access to exact wordings and examples anymore but not only does the author leave out crucial details (I can only speak for the hacks which I've done before and which I have a certain amount of experience with) but he also uses wrong information repeatedly (e.g he's referring to an example MAC address as a string of 5 hex sections like 90:3b:45:2c:12).
that certainly isn't anything you would expect in a serious book about anything, let alone on a topic where the slightest difference between an option "p" or "P" can have a big difference on the outcome of a command!

After all it's a cookbook and if nothing else, then at least the commands should be correct and consistent!

This book gave off the impression to be for a seasoned Linux user with maybe some penetration testing interests/experience but the author was spending screenshots and valuable space and time explaining how to install a Linux system on a hard drive (which I think is very basic knowledge) but then lacking explanation in areas like exploitation, meterprefer etc. which are so complex that they fill some books bit itself!

All in all the book seems to have some good information for somebody who wants to get an idea of pen testing (that's why I'm giving it 2 stars) and might give them the right things to look for and in more detail in itsec forums or other penetration testing books but there are just too many mistakes and lack of detail to take that book seriously. That plus the annoying repetitions of the same information about the "requirements" in most recipes left the bad impression that the purpose of this book was just to make the author some easy money.

I'm sorry that I can't be more specific about page numbers and exact text passages but since I've already returned the book I don't have access to it anymore and I also don't know how much of the actual content I'm allowed to reveal but I found it interesting that I was only able to see the first few and the last few pages of this book with the "look inside" feature Amazon offers.
Had I seen the pages before I would not have bought the book.
I have to say though that I really like the "look inside" feature on Amazon and it has helped me make better decisions on whether to buy a book or not.

Take care!
Were these reviews helpful? Let us know
click to open popover