Basic Security Testing with Kali Linux (English Edition) et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 23,05
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Basic Security Testing wi... a été ajouté à votre Panier
Amazon rachète votre
article EUR 7,15 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Basic Security Testing with Kali Linux (Anglais) Broché – 5 janvier 2014

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 23,05
EUR 23,05 EUR 37,70

Produits fréquemment achetés ensemble

Basic Security Testing with Kali Linux + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Prix pour les trois: EUR 48,35

Acheter les articles sélectionnés ensemble

Descriptions du produit

Présentation de l'éditeur

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In “Basic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

  • Kali Linux Introduction and Overview
  • Metasploit & Metasploitable 2 Tutorials
  • Information Gathering
  • A section on Shodan (the “Hacker’s Google”)
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Wireless (WiFi) Attacks
  • Social Engineering Attacks
  • Password Attacks
  • Kali on a Raspberry Pi
  • Securing your Network
Though no network can be completely “Hacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.

(Updated 12/2014 - All reported issues have been corrected including print issues, spelling issues & typos; also Veil install has been updated.)

Biographie de l'auteur

Daniel W. Dieterle has worked in the IT field for over 20 years. During this time he worked for a computer support company where he provided computer and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League school’s computer support department and served as an executive at an electrical engineering company. For about the last 5 years Daniel has been completely focused on security. He created and authors the “CyberArms Computer Security Blog”, and his articles have been published in international security magazines, and referenced by both technical entities and the media. Daniel has assisted with numerous security training classes and technical training books mainly based on Backtrack and Kali Linux.

Vendez cet article - Prix de rachat jusqu'à EUR 7,15
Vendez Basic Security Testing with Kali Linux contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 7,15, que vous pourrez ensuite utiliser sur tout le site Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur (beta) 34 commentaires
11 internautes sur 13 ont trouvé ce commentaire utile 
Excellent!!! 9 mars 2014
Par jhutchens - Publié sur
Format: Broché Achat vérifié
Regardless of if you are brand new to Kali Linux, or a seasoned veteran looking for a convenient pocket guide of tools, look no further than this book. This book makes an excellent resource for advancing your career, increasing your knowledge of information security, or just satisfying a general curiosity about common tactics employed in the hacking community. This is hands down, one of the best introductory resources out there. It covers a vast range of interesting topics relating to the usage of many of the most powerful tools that are installed on Kali Linux. Screenshots are included throughout to aid the reader in better understanding the subject matter presented. And in each section, the author gets straight to the point, without any unnecessary fluff. The content and presentation were fantastic. Five stars is an understatement...I highly recommend!!!
11 internautes sur 13 ont trouvé ce commentaire utile 
Best book on Linux security I have read. 29 janvier 2014
Par W. Marcy - Publié sur
Format: Broché
There are a number of books on linux security out there, and all of them fall short in some way, this one made clear what I was trying to learn, using great text and clear, concise photographs.

The writing is excellent, and the coverage that is there, which is at a expert level of depth (though written in such a way that a beginner can grasp), is solid. In addition, security is something you have to work at, so having an introduction to get you down the road is a good idea anyway. This is a solid walkthrough of Kali Linux security.
3 internautes sur 3 ont trouvé ce commentaire utile 
Easy to read, well balanced between beginner and experienced pen tester 26 janvier 2015
Par Amazon Customer - Publié sur
Format: Broché Achat vérifié
Outstanding read! I am attending a 6 month course on net attack/net defense and this book has been my classes favorite by a long shot. It is not part of the course curriculum, but is our go to for weekend work on our practice labs. Very easy to follow along, yet challenging enough to make sure you are grasping the concepts as you go along. One hint, if you are exploring and hit a road bump, take a look at the next chapter- My friends and I spent a lot of time spinning our wheels, only to find the answer on the next page.
Do yourself a favor and get a nice lab set up prior to going through the book. This book doesn't just go over obvious exploitable machines, but also does some great work on social engineering to get into more properly hardened machines, such as Win 7.
The pictures were very helpful and Mr. Dieterle's writing style is easy to follow. We went through just about every book for beginners to moderately experienced pen testers and this one was just the right balance for us.
8 internautes sur 10 ont trouvé ce commentaire utile 
Wasn't quite what I had hoped for 14 septembre 2014
Par Joel - Publié sur
Format: Broché Achat vérifié
This book appears to be a bit loosely thrown together. The pages are all black and white, and there are sentences on every page that are completely worn out and un-readable (printer ran out of ink?). There isn't much introduction offered for the topics in this book and some of the sections on tools are rather small.

I would like to see a Kali Linux book that addresses every tool and has better explanations.
This would be better as an E-book.
7 internautes sur 9 ont trouvé ce commentaire utile 
Noble Effort at Kali Exposure 11 novembre 2014
Par Spaceguy - Publié sur
Format: Broché Achat vérifié
All in all, this book gives a decent run through of a lot of the security tools found on a Kali Linux distribution. However, this book was not a home run for me for several reasons. First, the good....

Things I appreciated about this book:
* Nice screen shots - some have complained that they are black and white but I didn't care. They are clear and easy to read. Great job of giving us a visual.
* Writing is easy to read - The author doesn't try to talk over your head. Much appreciated.
* Social Engineering toolkit chapters are a great introduction to the SET capability
* Covers a variety of topics including social engineering, wireless exploits, and metasploit.

Where the book falls short:
* Some of the chapters were already outdated. For instance, I couldn't get Veil to work at all after two hours of troubleshooting, updating, reading web forums...etc. Metasploit google search was non-existant... Dmitry didn't work....etc. I understand that the author can't control when and how Kali updates, but it rendered certain portions of the book worthless.
* The Windows privilege escalation chapter(s) are a huge foul. He starts under the premise that you have a meterpreter session with a Windows 7 box, however doesn't show you how to do this. Windows 7 is not easily penetrable and since this is a "Basics" book, I would have expected the author to walk us through this or at least give us an idea of what exploit he ran.
* Would have liked more depth in most/all of the topics.
* Needs some exercises to reinforce learning.

This book attempts to find the hard-to-reach ground of being a beginner book, while also giving depth for clarity, and breadth of information. However, in my opinion it doesn't quite get there.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?