BackTrack 5 Cookbook et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus

Identifiez-vous pour activer la commande 1-Click.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 7,54
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Commencez à lire BackTrack 5 Cookbook sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

BackTrack 5 Cookbook [Anglais] [Broché]

Willie L. Pritchett , David De Smet
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
Prix : EUR 36,91 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mardi 28 octobre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 15,13  
Broché EUR 36,91  
Vendez cet article - Prix de rachat jusqu'à EUR 7,54
Vendez BackTrack 5 Cookbook contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 7,54, que vous pourrez ensuite utiliser sur tout le site Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Description de l'ouvrage

21 décembre 2012

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed step-by-step instructions on the usage of many of BackTrack's popular and not-so- popular tools

In Detail

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.

"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.

What will you learn from this book

  • Install and set up BackTrack 5 on multiple platforms
  • Customize BackTrack to fit your individual needs
  • Exploit vulnerabilities found with Metasploit
  • Locate vulnerabilities Nessus and OpenVAS
  • Provide several solutions to escalate privileges on a compromised machine
  • Learn how to use BackTrack in all phases of a penetration test
  • Crack WEP/WPA/WPA2 Encryption
  • Learn how to monitor and eavesdrop on VOIP networks


This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes.

Who this book is written for

This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

Offres spéciales et liens associés

Produits fréquemment achetés ensemble

BackTrack 5 Cookbook + Nmap 6: Network Exploration and Security Auditing Cookbook
Acheter les articles sélectionnés ensemble

Descriptions du produit

Biographie de l'auteur

Willie Pritchett

Willie Pritchett, MBA, is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure and data-driven application development and also in staffing services. He has worked with state and local government agencies, as well as helped many small businesses reach their goals through technology.

Willie has several industry certifications and currently trains students on various topics, including ethical hacking and penetration testing.

David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design.

He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.

Détails sur le produit

  • Broché: 296 pages
  • Editeur : Packt Publishing Limited (21 décembre 2012)
  • Langue : Anglais
  • ISBN-10: 184951738X
  • ISBN-13: 978-1849517386
  • Dimensions du produit: 23,5 x 19 x 1,6 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: 107.574 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

4 étoiles
3 étoiles
2 étoiles
1 étoiles
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
5.0 étoiles sur 5 evaluation 8 juillet 2013
Par thami
Format:Broché|Achat vérifié
Le livre est très bon. Néanmoins, je recommande dans un premier temps de lire : En effet, ce premier ouvrage permet de survoler la discipline avec une bonne initiation. Ensuite Backtrack Cookbook est plus poussé.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur (beta) 3.9 étoiles sur 5  17 commentaires
9 internautes sur 9 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Walks you through the steps, introduces a lot of tools 14 février 2013
Par Richard J. Wagner - Publié sur
This book is written in the Packt 'Cookbook' format. This means it doesn't contain a lot of theory or in-depth explanations. Rather, it contains lots of snippets telling you what to type and where to click. Most sections contain the headings:
Using (Some feature) - Tells a little about which tool you are about to use
Getting Ready - The prerequisites for using the specified utility
How to do it - Screenshots and script instructions for running the utility
How it works - A small explanation of what was done
There's more - additional explanations

To repeat that, this book is really a collection of short sections that describe how you can use various utilities in a dedicated Linux distro. So, what are the contents?

- Installing and customizing BackTrack
- Information Gathering
- Vulnerability identification
- Exploitation
- Privilege Escalation
- Wireless Networks
- Voice Over IP
- Password Cracking
- Forensics

The chapter on Forensics can serve a dual purpose. Besides helping with ethical penetration testing, this one also offers some interesting processes for other useful work: data recovery (damaged drives or deleted files) and password recovery. These can surely be useful in everyday situations.

The book contains an important warning: Used improperly, some of these tools may bring you to the attention of law enforcement agencies. But if you think carefully and act prudently, this book can be of use to someone validating their electronic defenses.
7 internautes sur 7 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Good book - helped me out! 19 février 2013
Par L. Fesenden - Publié sur
You know, sometimes, just sometimes something fortuitous happens to me. This was one of those times.
I was contacted by my friends over at Pakt Publishing to review their new book on BackTrack. Of course I said sure. Hey, I am a Linux junkie after all! It had actually been quite a while since I had played with BackTrack and this gave me *just* the incentive I needed, but let me tell you a bit about the book...

The book is a "cookbook" style book which gives you "recipes" or guided examples of common problems/scenarios and their fixes. The book is well written, a good reference for a pro, and a great tutorial for the beginner, and by beginner I am assuming that the person *does* have Linux experience, just not BackTrack experience as some command line comfort is pretty much a necessity for this kind of work. The first 2 chapters start you out exactly the way they should, by installing and customizing the distribution. What they don't tell you is it takes a good while to actually download the distro, but that is beside the point.

Once you actually get things running well, you can follow the book through some really decent examples from Information Gathering all the way through Forensics. The book covers all matter of subject matter and applications in between such as using NMAP, Nessus, Metaspolit, UCSniff and more. I mentioned that this was fortuitous for me and that was because one of the things the book covered was the Hydra program, and, as it turns out, that was the perfect tool for me to use in remediating some password synchronization issues across several hundred servers.

Anyone using a computer should have at least a basic understanding about keeping their valuable data safe, whether that data is for a multi-million dollar company or your own invaluable family photographs. This book goes to great efforts to not only explain how to detect, analyze and remedy such issues, but also gives important background about just how systems become vulnerable to begin with. If only for that reason alone, it's worth the read. If you are actually a sysadmin, this information is a must. For $23 for the ebook version, it's a no brainer. Good book. It helped me out and I'll wager that if you give it a read it'll do the same for you!
4 internautes sur 4 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 be very careful about doing exploitations 3 février 2013
Par W Boudville - Publié sur
BackTrack 5 seems best suited for a very experienced linux or unix user. One who also has sysadmin background. You get an indication of this by the second chapter. It commences by explaining how to get and use kernel headers in compiling code. The kernel headers are the source code of the linux kernel itself. Another indicator is the next topic, about installing Broadcom wireless drivers. It turns out these days that a lot of computer breakins happen via wireless networks.

The book educates you on a potentially useful tool - Maltego, for threat assessment. But perhaps more apropos is the discussion on how to use Nessus. This is a common and powerful tool for finding vulnerabilities. The Nessus screen captures give you some appreciation of the many options available within it. It is ecumenical. It can detect flaws in Microsoft and linux systems and the text explains both cases.

A variant of Nessus is also explored - OpenVAS. It has the advantage of being free, unlike Nessus which charges for professional use.

Chapter 5 may be problematic to some users. It describes how to exploit vulnerabilities. Other sections of the book are about finding these. But the intellectual defence of chapter 5 is that a sysadmin can get to appreciate how a black hat might come into her system, thus giving incentive for the sysadmin to patch flaws. Even so, be careful when or if you apply this chapter. This can be like running the password breaker Crack. In some companies, doing the latter in an unauthorised way is grounds for dismissal. Likewise if using the exploitations in chapter 5, especially against a system that is not your company's.
2 internautes sur 2 ont trouvé ce commentaire utile 
2.0 étoiles sur 5 These Recipes will not make you a chef nor will they make you look like one 26 août 2013
Par R1d3r - Publié sur
Format:Format Kindle
I'm not sure if I was just expecting too much from this book or if other readers are just not that much of a stickler about certain things but when I see that many errors (!), misspellings, inconsistencies, repetitions and simplifications of an actually quite complex topic, I start to believe that the author was just out there to make some easy money.

I was very disappointed with this book. I was pretty excited after reading all the somewhat positive reviews and I've read other "cookbook" style books before. It's definitely not the style. I was not expecting a book that explains every detail about a certain process but I was also not expecting a book that leaves out crucial steps in a process (e.g. how to get mon0 up and running for wireless hacking and that mon0 and wlan0 and not exactly the same things or simply different wireless cards like the author makes it seem). I think it's important if you want to understand that hack that you understand that you need to put your card into promiscuous mode. That could've been explained in one or two sentences but instead lots of repetitions of "requirements" that would've been enough to be mentioned once.

Also a lot of the "hacks" are portrayed to be much simpler than they actually are in real life and that's ok if the author makes the reader aware of the pitfalls and difficulties of a certain hack (I'm aware that there can't be a one-size-fits-all instruction) but this book is incorrectly giving the impression that some things are just as easy as adding a few lines in a command line and that's it. i'm sure that's good for selling books and may appease the novice hacker but only until they actually try it out in their lab.
unfortunately I returned the book and don't have access to exact wordings and examples anymore but not only does the author leave out crucial details (I can only speak for the hacks which I've done before and which I have a certain amount of experience with) but he also uses wrong information repeatedly (e.g he's referring to an example MAC address as a string of 5 hex sections like 90:3b:45:2c:12).
that certainly isn't anything you would expect in a serious book about anything, let alone on a topic where the slightest difference between an option "p" or "P" can have a big difference on the outcome of a command!

After all it's a cookbook and if nothing else, then at least the commands should be correct and consistent!

This book gave off the impression to be for a seasoned Linux user with maybe some penetration testing interests/experience but the author was spending screenshots and valuable space and time explaining how to install a Linux system on a hard drive (which I think is very basic knowledge) but then lacking explanation in areas like exploitation, meterprefer etc. which are so complex that they fill some books bit itself!

All in all the book seems to have some good information for somebody who wants to get an idea of pen testing (that's why I'm giving it 2 stars) and might give them the right things to look for and in more detail in itsec forums or other penetration testing books but there are just too many mistakes and lack of detail to take that book seriously. That plus the annoying repetitions of the same information about the "requirements" in most recipes left the bad impression that the purpose of this book was just to make the author some easy money.

I'm sorry that I can't be more specific about page numbers and exact text passages but since I've already returned the book I don't have access to it anymore and I also don't know how much of the actual content I'm allowed to reveal but I found it interesting that I was only able to see the first few and the last few pages of this book with the "look inside" feature Amazon offers.
Had I seen the pages before I would not have bought the book.
I have to say though that I really like the "look inside" feature on Amazon and it has helped me make better decisions on whether to buy a book or not.

Take care!
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A guide to Backtrack 5 5 mars 2013
Par RUBEN SANCHEZ - Publié sur
The Backtrack 5 Cookbook is appropriate for a person who wishes
use this version of Linux. It helps you to install
Backtrack in a hard disk directly or using VirtualBox. You can carry it on a usb
and to run it on any machine (no matter the operating system you have installed
on your hard drive).

This operating system is designed to test security in Internet networks
and for make penetration test.
Before reviewing this book I could not imagine the amount of security testing
offered by Backtrack. These tests range from security on WEP, WPA and WPA2
wireless networks to the study of advanced topics like metasploit and security of VoIP
(Voice over IP). It is also useful, for example, if we lose our
personal password of Windows, because it help us to recover it, using Backtrack.

Backtrack is a Linux operating system based on Debian distribution.
The authors of the book are Internet's security professionals,
but it is written in a simple and enjoyable form for the people
who do not have previous experience with Backtrack.

I highly recommend it for those beginners who want to manage this Linux release, and for
those who want to better understand the issues of Internet network security.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?