• Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Kali Linux Cookbook a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par momox fr
État: D'occasion: Bon
Commentaire: Du N°1 des livres et articles multimédia d'occasion en Europe.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Kali Linux Cookbook (Anglais) Broché – 15 octobre 2013


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 33,75
EUR 33,15 EUR 29,76
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
  • Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
  • Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

What you will learn from this book

  • Install and setup Kali Linux on multiple platforms
  • Customize Kali Linux to your individual needs
  • Locate vulnerabilities with Nessus and OpenVAS
  • Exploit vulnerabilities you've found with Metasploit
  • Learn multiple solutions to escalate privileges on a compromised machine
  • Understand how to use Kali Linux in all phases of a penetration test
  • Crack WEP/WPA/WPA2 encryption
  • Simulate an actual penetration test using Kali Linux

Approach

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is written for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

Biographie de l'auteur

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.




Détails sur le produit


Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x94873144) étoiles sur 5 6 commentaires
6 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x945d4d2c) étoiles sur 5 Kali LInux Cookbooks 20 février 2014
Par Jurandir - Publié sur Amazon.com
Format: Broché Achat vérifié
The examples do not match, there are many mistakes... wrote to the author, no reply... disappointed !

I really expected more...
6 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x945d4f78) étoiles sur 5 There are better options with better writing 9 février 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Nothing is explained, horrible writing with plenty of errors. Save your money and look at some other similar books on Kali.
7 internautes sur 8 ont trouvé ce commentaire utile 
HASH(0x945d4f3c) étoiles sur 5 Move along, this is not the Kali Linux book you are looking for. 24 janvier 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Poorly written !!!

"How it works..." sections explain nothing.

Complex commands are presented with no background or explanation of their purpose or arguments.

If I could return this book, I would.

A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.

As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
HASH(0x945d524c) étoiles sur 5 surveys the field 8 décembre 2013
Par W Boudville - Publié sur Amazon.com
Format: Broché
The back cover sounds like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x945d5750) étoiles sur 5 Kali Linux 29 mars 2014
Par Torrez - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
This particular book does not detail the recipes enough with explanation to what's going on it seems to skim over a lot of details...Still searching for something superior to this ...
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?