An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle eBooks lesen - auch ohne Kindle-Gerät - mit der gratis Kindle Lese-App für Smartphones und Tablets.
Web Penetration Testing with Kali Linux
 
 

Web Penetration Testing with Kali Linux [Kindle Edition]

Joseph Muniz , Aamir Lakhani
5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)

Kindle-Preis: EUR 17,30 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 17,30  
Taschenbuch EUR 41,72  


Produktbeschreibungen

Kurzbeschreibung

In Detail

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.

Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.

"Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.

You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.

On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.

Approach

"Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.

Who this book is for

"Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.

Über den Autor und weitere Mitwirkende

Joseph Muniz

Joseph Muniz is a technical solutions architect and security researcher. He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal network.

Joseph runs TheSecurityBlogger.com website, a popular resources regarding security and product implementation. You can also find Joseph speaking at live events as well as involved with other publications. Recent events include speaker for Social Media Deception at the 2013 ASIS International conference, speaker for Eliminate Network Blind Spots with Data Center Security webinar, speaker for Making Bring Your Own Device (BYOD) Work at the Government Solutions Forum, Washington DC, and an article on Compromising Passwords in PenTest Magazine - Backtrack Compendium, July 2013.

Outside of work, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.



Aamir Lakhani

Aamir Lakhani is a leading Cyber Security and Cyber Counterintelligence architect. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations.

Lakhani leads projects that implement security postures for Fortune 500 companies, the US Department of Defense, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter defense measures for defense and intelligence agencies, and has assisted organizations in defending themselves from active strike back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, and Advanced Persistent Threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books, and has appeared on National Public Radio as an expert on Cyber Security.

Writing under the pseudonym Dr. Chaos, Lakhani also operates the DrChaos.com blog. In their recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, infosec specialist, superhero..., and all around good guy."


Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 57244 KB
  • Seitenzahl der Print-Ausgabe: 344 Seiten
  • ISBN-Quelle für Seitenzahl: 1782163166
  • Verlag: Packt Publishing (25. September 2013)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B00FF8OK12
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: #92.656 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Kundenrezensionen

4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
5.0 von 5 Sternen Für Neulinge 27. November 2013
Von Majestix
Format:Kindle Edition|Von Amazon bestätigter Kauf
Für jemanden der sich auf dem Gebiet Linux nicht sicher ist, jedoch verstanden hat das es mit Windows nicht möglich ist vernüftig zu testen wird dieses Buch wärmstens empfohlen.
Voraussetzung: Englisch lesen ;)
Das Buch beginnt wirklich am Anfang mit Grundlagen und führt an das Thema heran. Es gibt dann Beispiele und Anleitungen wie Systeme getestet werden mit Kali.

Ein Buch gefüllt mit Wissen! PERFEKT!

Wer sich unsicher ist blätternt einfach in der Vorschau durch das Inhaltsverzeichnis ;)
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.1 von 5 Sternen  7 Rezensionen
7 von 8 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Lacks the specialization it advertises 23. Dezember 2013
Von M. Lewis - Veröffentlicht auf Amazon.com
Format:Kindle Edition
This book was a quick read for people familiar with penetration testing in general because there was very little specialization beyond the generalities of the discipline. My specialty is network penetration testing and I'm weaker on the Web app side of things. I was hoping for an in-depth study into what the title advertises, Web penetration with Kali. Instead, the book reads more like a very high level survey of tools available to a Web penetration tester. More time was spent on how to install, configure, and run the tools than on how Web pentesters use them in attacks.

A large portion of the content was padded with screenshots and step-by-step instructions on how to get the tools up and running. Most of the first half of the book covers pretty standard fare on what penetration testers do regardless of their focus, like recon, social engineering, and cracking passwords. Nothing I'd call Web-specific attacks. And at the end, an unexpectedly out of place diversion to file system forensics eats up a chapter as well. Doesn't do anything to help you with Web-based attacks, and is far too brief and summarized to help you with forensics.

I learned far more about the guts of Web application penetration testing; what the attack vectors are, how they work, what they look like, and which tools to use, from the OWASP Testing Guide.
4.0 von 5 Sternen Good book for beginners 27. März 2014
Von Rafal Zdziech - Veröffentlicht auf Amazon.com
Format:Taschenbuch
There is no a perfect book for anything :). The good is good for people no familiar with the subject. Give you ability to learn more about kali Linux. You don't have to be expert in this field or have a degree in IT to be able to understand content of this bookm
1 von 2 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Web Penetration Testing with Kali Linux 7. März 2014
Von Bandit R. - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Von Amazon bestätigter Kauf
The book is good for beginner Penetration Testers. It gives brief details on the tools on Kali Linux. Unfortunately the authors wrote about tools that were not on Kali Linux. I was hoping for details on the Kali Linux tools
0 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great product! This is something that quality is a must and it was provided. Will buy again! Right price, fast service! 17. März 2014
Von Peter Walker - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Von Amazon bestätigter Kauf
Great product! This is something that quality is a must and it was provided. Will buy again! Right price, fast service!
0 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Perfect for beginners 27. Januar 2014
Von J. Gongora - Veröffentlicht auf Amazon.com
Format:Taschenbuch
This book is very usefull for a beginner, it'll help you to realize a pentest from A to Z.
This book respects a real pentest methodology used by pentesters.
Everything is clearly explained, step by step.
This book is my new arm for my next pentests :-)
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


ARRAY(0xaa7476cc)