Penetration Testing with BackBox et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Penetration Testing with BackBox sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Penetration Testing with BackBox [Anglais] [Broché]

Stefan Umit Uygur

Prix : EUR 23,53 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mercredi 24 septembre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 10,09  
Broché EUR 23,53  

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.

Overview

  • Experience the real world of penetration testing with Backbox Linux using live, practical examples
  • Gain an insight into auditing and penetration testing processes by reading though live sessions
  • Learn how to carry out your own testing using the latest techniques and methodologies

In Detail

BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and security assessments. Designed to be fast and easy to use while providing a minimal yet complete desktop environment, Backbox comes with its own software repositories and is continually updated to the latest stable version of the most widely used and best-known ethical hacking tools.

This book provides an exciting introduction to BackBox Linux in order give you familiarity with and understanding of this amazing Linux security distro, making you feel comfortable with both the subject of pen-testing and BackBox. The book progresses through topics based on standard cases of penetration testing from the initial steps to the final procedures.

This book will help you discover the exciting world of penetration testing through a series of step-by-step, practical lessons. Penetration Testing with BackBox is organized into eight chapters. Starting with an introduction to BackBox Linux in order to give you a solid grounding of this amazing Linux security distro, including both its design philosophy and feature set, before moving on to practical tutorials in using BackBox. The book is arranged in a chronological order based on standard cases of penetration testing. For those more experienced in the use of penetration testing tools, each chapter can be read independently, providing a detailed overview of how BackBox will augment your arsenal of tools at each step of the penetration testing process.

Throughout this book, you will be given a clear picture of IT security cases by having one of the most popular topics of penetration testing demonstrated in a user-friendly way. By the end of the book, you will have learned all the fundamental skills needed to use BackBox for ethical hacking.

What you will learn from this book

  • Perform reconnaissance and collect information about an unknown system
  • Perform vulnerability scanning, management, and assessment, as well as understand false positives
  • Understand how SQL injection attacks work and find injectable pages on a web server
  • Sniff the network to capture sensitive data and learn different methods of privilege escalation
  • Maintain permanent access on a target server once access is initially granted
  • Use exploitation tools like Metasploit to exploit the reported vulnerabilities
  • Learn how to document and generate reports from the entire auditing process

Approach

This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting.

Who this book is written for

This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing.

Biographie de l'auteur

Stefan Umit Uygur

Stefan Umit Uygur has been an IT System and Security engineer for 14 years. He is an extremely motivated open source software evangelist with a passion for sharing knowledge and working in a community environment. He is highly experienced in Penetration Testing and Vulnerability Analysis, Management, and Assessment. He has been involved in many open source software projects, for example BackBox, where he is part of the core team. He has helped to promote the free software culture around the world by participating and organizing international confere nces. He significantly contributes to shedding the false and negative perceptions around hacking and hackers by promoting the hacker world in a positive light. He explains in detail the real world of hacking, hackers' motivations, and their philosophy, ethics, and freedom. These activities are promoted mainly through national and international magazines, and in particular, during the conferences that he participates. Along with his professional activities, he has contributed to the Linux magazine, the PenTest magazine, and a few other small, periodic, technical publications.

However, his main passion is continuous collaboration with the community as he believes in the community more than anything else. He strongly feels that knowledge shouldn't be owned by a few people, but should be the heritage of the entire collective. He is always grateful to the community for the skills and the knowledge he possesses. One of the definitions he gives to the community is that it is the real school and university where one truly learns.


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.0 étoiles sur 5  5 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Good starting point for beginners 3 avril 2014
Par n - Publié sur Amazon.com
Format:Broché
I'm totally new to penetration testing, this book gave me important information: especially in step of setting up the penetration test abd the backbox interface (loved the list of all tool included with a brief description).
It's a easy to read text but you have to know at least the average commands of linux shell to bring out the maximum potential of the written information.
In less than 150 pages you can start testing and understand what's under the hood of a informatic system, not for advanced penetration testers but a good starting point.

Bravo.
4.0 étoiles sur 5 Great book 19 mai 2014
Par Aussan Saad-Ali - Publié sur Amazon.com
Format:Format Kindle
I must say this book was a lot better then I expected.
It's a basic introduction to penetration testing using backbox linux.
When you start it will introduce you to backbox and the tools it has, then it goes through the steps of penetration testing, it does a good job introducing you in each chapter to some of the tools used for each step of the pen testing (info gathering, enumeration, vulnerability scanning..etc), and on the last 2 chapters you will go through the process of a full penetration test and report writing.

My only wish was that it was a bit more detailed on some of the tools, don't get me wrong it's a great book, especially for someone new to the penetration testing.

All in all I would recommend this book.
4.0 étoiles sur 5 Detailed and concise 12 mai 2014
Par Ozoya - Publié sur Amazon.com
Format:Format Kindle
The penetration testing with Backbox is a book that is both detailed and concise. For any newbie with a basic knowledge of Linux, this is the right material for understanding end to end penetration testing with Backbox. The only drawback is that there is not enough information about the Metasploit framework on this material (sad because Metasploit is usually the exploit weapon of choice for the average penetration tester). Overall it is a good book worth every dollar. I expect the Backbox guys to follow up this material with a video tutorial.
5.0 étoiles sur 5 Great introduction to this pentesting distro 11 mai 2014
Par Philip A. Polstra - Publié sur Amazon.com
Format:Broché
[...]

'm not exactly a stranger to penetration testing. I like to do pentesting with armies of BeagleBones running my custom Linux distro, The Deck. When teaching pentesting in the classroom I often find myself reluctantly using Kali Linux just because it has the tools I need to teach included by default. It just so happens that the request to review this book corresponded with my having to perform a pentest on a network setup by students in one of my classes at the university. I decided to use BackBox for this test with the book as my guide.

What I liked about this book

I thought this book was very well written. It is relatively short with just over 100 pages of chapter content. It does a good job of pointing out the little gotchas that come with using anything for the first time. For example, the book covers how to fully setup OpenVAS in order to actually use it. The book also does a pretty good job of leading you through a typical pentest and the tools that might be used to perform it.

What this book covers

The first chapter is a overview of the rest of the book. Later chapters walk through the pentesting process which includes: information gathering, vulnerability assessment, exploitation, privilege escalation, maintaining access, and documentation.

What is missing

I don't really feel like there was anything missing from this book. While you could always have more coverage of the tools provided by any pentesting distro, this book does a great job of hitting the most commonly used packages. If I were to add anything it would be a couple of case studies to more completely explore the packages provided by BackBox.

The Net

Using this book as a guide I was able to perform a successful pentest using BackBox. I am strongly considering using BackBox in my upcoming pentesting class. I would recommend this book to anyone wanting to know more about BackBox.
3.0 étoiles sur 5 Good for those new to penetration testing 16 mars 2014
Par dan - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
It's a cheap book on Amazon, you can get the kindle edition for $10, which makes it a fairly priced, light read, however I don't think I'de pay more than $10 for this book. The book is a solid introduction to penetration testing with a scoped subset of tools, so I recommend it to people looking to get into penetration testing. The book is light in both technical detail and theory, but it provides solid working examples of tools and where they fit into the methodology, making it a great book for practically getting into pen-testing. There is certainly a lot left to be desired, in both explaining the theory and advanced techniques of penetration testing, as well as doing a deeper dive on the tools discussed. However, despite those critiques, this is the type of book you can hit the ground running with, and because BackBox isn't your standard pen-test kit, your bound to be introduced to a few cool, new tools for your repertoire. It should be mentioned that Stefan is part of the BackBox team as their public relations specialist, so I wouldn't exactly call this book unbiased. You can read my full review at: lockboxx.blogspot[.]com
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?