Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 19,98
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe anhören Wird wiedergegeben... Angehalten   Sie hören eine Hörprobe des passenden Audible-Hörbuchs zu diesem Kindle-eBook.
Weitere Informationen

BackTrack 4: Assuring Security by Penetration Testing Kindle Edition

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 19,98

Länge: 392 Seiten Sprache: Englisch



Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.

Über den Autor und weitere Mitwirkende

Shakeel Ali is a main founder and CTO of Cipher Storm Ltd, UK. His expertise in the security industry markedly exceeds the standard number of security assessments, compliance, governance, and forensic projects that he carries in day-to-day operations. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses and government institutions globally. He is an active independent researcher who writes various articles, whitepapers, and manages a blog at He regularly participates in BugCon Security Conferences, Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.


  • Format: Kindle Edition
  • Dateigröße: 4994 KB
  • Seitenzahl der Print-Ausgabe: 392 Seiten
  • Verlag: Packt Publishing (14. April 2011)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B0056H9AAS
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
  • Amazon Bestseller-Rang: #600.926 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf (beta) HASH(0x9be5a9c0) von 5 Sternen 58 Rezensionen
64 von 67 Kunden fanden die folgende Rezension hilfreich
HASH(0x9bdc4144) von 5 Sternen For people who want to know what it's like to be a pen tester 19. Juni 2011
Von JAMES D MURRAY - Veröffentlicht auf
Format: Taschenbuch
This book is not just about learning a bunch of command line tools for p0wning a few poorly-maintained systems. In this book, the authors do a good job exposing the reader to the many facets of pen testing, and present the readers with the opportunity to try a few new things along the way, including virtualization, Linux, and BackTrack itself.

The authors introduce the idea that pen testing is not about randomly using a collection of tools to plink around a network. Instead, a structured, procedural methodology should be used to achieve timely, thorough, and reportable results. The author's also provide a detailed description of a security testing methodology to be used with BackTrack itself.

Each step in this methodology represents an element in the penetration testing life cycle management performed for each customer. The authors describe how this organized progression allows pen testers to determine their course of action, plan for needed resources, and not waste time and resources by duplicating effort. My only complaint is that this section is too small, and deserves expanding using actual case studies.

A considerable number of pen testing tools for each step in the methodology are covered with examples and instruction. Popular tools covered include Metasploit (Meterpreter), Maltego, NMap, NetXpose, and Nessus. Tools for exploiting (uh, testing) Web servers, databases, applications, and even Cisco devices are also covered.

I was very happy to see a chapter on Social Engineering. Experienced pen testers often remark that the most penetrable area of any system are the people who use and control it. The authors provide a detailed description of the psychology, tactics, and objectives of social engineering and how it is used to penetrate the "fleshy" parts of information systems.

This book is intended to educate both novice and experienced pen testers on how to successfully use BackTrack 4. I am sure not every professional pen testing will agree with everything in this book, as it represents the personal experience of only a few people in the profession. However, novices will find a tremendous amount of hands-on practice and enlightening information related to the pen testing profession in clear and readable instructions. Pros should a few things about becoming an even more efficient and versatile pen tester too.
44 von 45 Kunden fanden die folgende Rezension hilfreich
HASH(0x9c7ec288) von 5 Sternen Good stuff! 11. Juni 2011
Von L. Fesenden - Veröffentlicht auf
Format: Taschenbuch
Right after I got this book, Backtrack 5 was released. My intention was to go through the book and compare/contrast things to Backtrack 5. Well, we all know the saying about the best layed plans...
That being said, I believe the information in this book to be directly applicable to Backtrack 5 and a good reference for it!

The book is a great tutorial and walk-through on how to use Backtrack for security and penetration testing, but, more than that, it offers good information about the field in general. You will go through software installations, software overviews, methodologies, tests / testing, and my favorite part, reporting and deliverables, a MUST for professional computer people.

I think this is an excellent book to add to your knowledge arsenal and you may be surprised at just how much you didn't know. I know I was. This really is an important subject for computer professionals and I cant think of a better way to brush up than by grabbing a copy today. Thumbs up!
50 von 52 Kunden fanden die folgende Rezension hilfreich
HASH(0x9d42a51c) von 5 Sternen Very Good For Backtrack Beginners 12. Juni 2011
Von Mathew R Burnett - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
This book was written very well for any BackTrack Beginners. Note going into this book though that BackTrack 5 is now available for free download. The chapters go over a lot of the tools, and you delve into Metasploit and some other Vulnerability Tools as well, though it sometimes seems rushed (which is why I am giving it a 4star instead of 5star rating). I think this book would have been amazing if it had a DVD with extra stuff, or even with the Backtrack ISO on it.

I would recommend this to anyone who doesn't know very much about BackTrack, or anyone who just wants a reference for it. This is also a great book for beginner Pen Testers.
53 von 56 Kunden fanden die folgende Rezension hilfreich
HASH(0x9d42a588) von 5 Sternen BackTrack 4: Assuring Security by Penetration Testing 12. Juli 2011
Von Mat - Veröffentlicht auf
Format: Taschenbuch
I've always had an interest in BackTrack since version 4, however it seemed to be the one distribution that you couldn't find a recent (or decent) book for. There are a few out there, but both several versions old leaving tidbits and tutorials from assorted websites and youTube as the sole source of information on the distribution and the toolset contained within. I was fortunate to come across this book from Packt Publishing. BackTrack 4: Assuring Security Testing by Penetration Testing was the book I've been looking for.

This book did wonders for me. Not only did it begin talking about the process and procedures for for planning and mapping out your testing, but also goes in-depth detailing and demonstrating the tools following that process. Those are: Target Scoping, Information Gathering, Target Discovery, Enumerating Target, Vulnerability Mapping, Social Engineering, Target Exploitation, Privilege Escalation, and Maintaining Access.

I went through this book with the latest distribution, BackTrack 5. Although majority of the information was applicable, i still had to pop over to a BackTrack 4 virtual for some of the exercises. Overall, I found this book extremely useful and would definitely recommend it to anyone wanting to learn about penetration and network security or test their home defenses. While not a complete or definitive volume by any means, it is a great foundation for those wanting to start down the path of penetration testing.
49 von 52 Kunden fanden die folgende Rezension hilfreich
HASH(0x9d42a48c) von 5 Sternen BlackHat underground exposed 13. Juli 2011
Von - Veröffentlicht auf
Format: Taschenbuch
Whenever someone asks me about computer security, I try to differentiate between two concepts defensive security (Cisco, McAfee, Checkpoint, Policies, Procedures, Rules, etc) and offensive security (Pen-testing, ethical hacking, etc). This book is an absolute guide for IT & network professionals who wish to explore the offensive security world. Especially those who have prior knowledge and experience with information security concepts or hold basic certification like Security + or CISSP. Today, many penetration testing courses offer the insights of offensive security through BackTrack operating system, not just because it is a hacking platform but it also leverages the process of penetration testing in a systematic order. The book begins with a brief history, description, installation and configuration of BackTrack 4. It also explains how to handle various types of installations (Virtualization, HDD, USB), and how to start-up and running your own BackTrack 4 copy in just few steps.

Reading through the initial chapters you will encounter the core pen-testing concepts and descriptions of various assessment methodologies. They are explained very clearly and precisely as a whole. You will also find explanations of best security assessment tools, their options usage and results interpretation, and pen-testing project management and reporting guidelines. What I most like about this book is that the tools are well-organized in penetration testing methodology shown with practical examples and best yet, compatible with BackTrack 5 too. I hope the authors will take out an update of this book for BackTrack 5 soon. It is a great addition to my information warfare arsenal.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.

Kunden diskutieren