Commencez à lire Kali Linux Network Scanning Cookbook sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Kali Linux Network Scanning Cookbook [Format Kindle]

Justin Hutchens

Prix conseillé : EUR 24,25 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 40,07
Prix Kindle : EUR 21,93 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 18,14 (45%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 21,93  
Broché EUR 40,07  

Descriptions du produit

Présentation de l'éditeur

Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. This immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them.

Biographie de l'auteur

Justin Hutchens

Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force, where he worked as an intrusion detection specialist, network vulnerability analyst, and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He holds a Bachelor's degree in Information Technology and multiple professional information security certifications, to include Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), eLearnSecurity Web Application Penetration Tester (eWPT), GIAC Certified Incident Handler (GCIH), Certified Network Defense Architect (CNDA), Certified Ethical Hacker (CEH), EC-Council Certified Security Analyst (ECSA), and Computer Hacking Forensic Investigator (CHFI). He is also the writer and producer of Packt Publishing's e-learning video course, Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 7144 KB
  • Nombre de pages de l'édition imprimée : 452 pages
  • Editeur : Packt Publishing (21 août 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00MXS4ZC6
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°172.450 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur (beta) 4.7 étoiles sur 5  11 commentaires
3 internautes sur 3 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Excellent Cookbook for setting up a lab and beyond 19 novembre 2014
Par Charles Profitt - Publié sur
Format:Format Kindle
Chapter 1: Getting Started
Good detailed coverage of setting up VMWare Player (Windows) or VMWare Fusion (Mac OS X). I would have seen the author at least cover VirtualBox as it works on Windows, OS X and Linux.

The discussion on having vulnerable targets to work with covers Metasploitable which is an excellent choice. I am glad the point was stressed to not expose a Metasploitable system to any untrusted network. While I appreciate learning on Windows XP I would have expected a cook book to focus on either the latest Windows OS (8.1) or the most used Windows OS (Windows 7).

Chapter 2: Discovery
For some IT professionals the review of the OSI model is potentially redundant, but for many it is essential to truly understand the process of scanning a network. The discussion on layer 2 vs layer 3 vs layer 4 discovery was very clear and effective.

I like the depth given for each of the chosen tools (Scapy, ARPing, Nmap, NetDiscover, Metasploit, ICMP ping, fping, and hping3). I have not made much use of Scapy, but I think I will be adding it to my tool bag due to the excellent python examples given making use of it.

Chapter 3: Port Scanning
This chapter was well done with coverage of Scapy, Nmap, Metasploit, Hping3, Dmitry and Netcat. Nmap is always a favorite of mine, but I was particularly impressed by the coverage of Scapy scripts used for scanning for zombies.

Chapter 4: Fingerprinting
The tools covered in this chapter are Netcat, Python sockets, Dmitry, Nmap NSE, Amap, xProbe2, pOf, Onesixtyone and SNMPwalk. I think the best part about this chapter is the explanation of how the various programs identify (fingerprint) the target. In particular explaining how xProbe2 can claim that several identifications are 100% when there can obviously really be only one that is accurate.

Chapter 5: Vulnerability Scanning
This chapter covered Nmap scripting Engine, MSF auxillary modules, Nessus, HTTP interaction and ICMP interaction. I liked the python scripts and use of wget in the sections of HTTP interaction. I would have liked to see the chapter deal with openVAS in addition to Nessus.

Chapter 6: Denial of Service and Chapter 7: Web Application Scanning are both covering areas I do not have much opportunity to play with. I did like the coverage of the Burp Suite. For people interested in looking at these areas there is a wealth of knowledge here.

Chapter 8: Automating Kali Tools
This is the chapter that reveals the pay off of using a Linux based security tool. The ease of scripting each process. I particularly liked the discussion on how to analyze Nmap output with grep.

Overall, I feel the book is a solid addition to the libraries of Systems Administrator and Penetration testers from novice to intermediate.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 5/5 Hands On and It Just WORKS! 8 octobre 2014
Par Bill Jones - Publié sur
Kali Linux Network Scanning Cookbook

Where to begin with this book, well we can start by just how amazing it is! Right off the start you setup a virtual environment and the instructions are pretty clear, I had no issues getting this going. The Windows XP system I didn't even bother with as I wanted to focus on ISO images of systems I had on hand and that worked perfectly for me. Setting up SSH access was pretty simple, and despite mentioning SCP for secure file transfers it would have been nice to have an example; however fear not you can always use man. On the up side it was nice to see both coverage for VIM and Nano which are standard on all Linux distributions I'm aware of.

This book isn't the standard pentesting book that I've found, it actually goes over some of the foundation behind the different layers of the network protocols and how everything integrates and works in harmony, and how using this information you'll know what to look for. Service discovery, port scanning, range sweeping, service attacks, and even web application scanning were all covered and well documented. The book has a hidden gem near the end with Chapter 8, the automation alone is well worth the cost of this book! I highly recommend this to anyone who wants to learn more about securing their network setup, know your enemy and you'll be a head of the crowd.

Publisher Link:
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Outstanding book, succeeds where others fail 10 novembre 2014
Par J. T. Schreiner - Publié sur
I really enjoyed this book, and am looking forward to going back through it and practicing with the labs that were very aptly explained in the book. I've read a lot of IT books, and especially a lot of books on IT security. Most of these books are a disappointment because they either lack the CLI examples and explanations, or do not explain the context behind what you are doing AND why certain techniques either succeed or fail. This book covers both of these common issues, and does so quite well. If I wasn't already impressed enough with the author's ability to flow back and forth between high level general concepts (like the difference between Layer 2 and Layer 3 scanning) and very technical command line walk-thrus, he also went over a myriad of DIFFERENT tools. I liked how we weren't just told, "this is the best scanning tool that uses ARP and here is how you use it", the author actually went over several different tools and gave us exposure to what is out there, not just what the author prefers. This book really set the bar for me and I am very much looking forward to the author's next project.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The A-Z Network Scanning Instruction Book 31 octobre 2014
Par D. Dieterle - Publié sur
All that you ever wanted to know about scanning networks and then some! This is one of the most complete step-by-step scanning guides that I have seen. The book starts out with the very basics of network scanning and progresses through stages to more advanced scans and even exploitation.

All the basics are present, like using Nmap, ARPing, Scapy and other tools to perform varied levels of discovery, port scanning and fingerprinting. You are then masterfully shown how to greatly expand the capabilities and functions of these tools by using scripting.

But it doesn't stop there, you then move on to using scanning tools and Burp Suite to perform Denial of Service attacks, SQL injection and Metasploit attacks. Because really what is a scanning book without including offensive attacks?

A great learning tool for new readers, and an exceptional reference guide for veterans. I highly recommend this book!
5.0 étoiles sur 5 it runs always under the super user rights and typically is installed as a VM ... 16 novembre 2014
Par A. Zubarev - Publié sur
Format:Format Kindle
With the advent of the constantly connected computers (not only the Internet) the attack surface has increased immensely. At the same time the user machines became as powerful as the servers were. However, there was very little done to educate computer professionals to detect, prevent and cope intrusions or penetration attacks. Kali Linux Network Scanning Cookbook can serve very well as one to close the gap.

A little on Kali Linux: it is a specialized distribution for penetration testing and forensics purposes. It got a lot of traction lately in the penn-testing and security pros circles. As one of the less subtle features, it runs always under the super user rights and typically is installed as a VM guest OS.

Let me tell, I was shocked the book counted 450 + pages! This is how much insight and tooling actually was created to harden your computing infrastructure (jargon used by security pros, meaning making your systems less vulnerable). It is hard to imagine an average practitioner would harness each in one’s daily use, but I would to strive to. And I advocate looking in details into every applicable offering. Besides, the book uses a lot of Python code, thus the reader shall make sure one is familiar and feels comfortable performing some coding as well using basic text editors as Nano and VI. If the reader ever decides to prepare for the book I would recommend a good book on Learning Python and another from Packt on VI – Hacking VIM.

Justin being a very experienced professional delivers the material at a very detailed level, in depth, with a lot of examples and in a very digestible format. If I am not mistaken several dozens of tools are covered in his book. I think this is unprecedented!

I liked the most the chapter on TCP scanning, it was both fun and insightful. The other topic I enjoyed and trust can apply at work as a data guy is the SQL Injection with sqlmap. Fingerprinting and ghost OS detection were new to me. The familiar, but impossible to not to get in touch with tools discussed in the book are matasploit, fping and SNMPWalk. Frankly, most tools were totally new to me and I was able to gain a lot of knowledge out of this book.

I rated this book as 5 out of 5 – there seems to be nothing that can be taken out of the book nor added. A great read, highly recommend it!
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique