Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 17,49
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest <Einbetten>
BackTrack 5 Cookbook von [Pritchett, Willie, Smet, David De]
Anzeige für Kindle-App

BackTrack 5 Cookbook Kindle Edition

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 17,49

Unsere Schatzkiste
Entdecken Sie monatlich Top-eBooks für je 1,99 EUR. Exklusive und beliebte eBooks aus verschiedenen Genres stark reduziert.



In Detail

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.

"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.


This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes.

Who this book is for

This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

Über den Autor und weitere Mitwirkende

Willie Pritchett

Willie Pritchett, MBA, is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure and data-driven application development and also in staffing services. He has worked with state and local government agencies, as well as helped many small businesses reach their goals through technology.

Willie has several industry certifications and currently trains students on various topics, including ethical hacking and penetration testing.

David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design.

He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


  • Format: Kindle Edition
  • Dateigröße: 53856 KB
  • Seitenzahl der Print-Ausgabe: 298 Seiten
  • Verlag: Packt Publishing (21. Dezember 2012)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B00ATM05RW
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Aktiviert
  • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
  • Amazon Bestseller-Rang: #466.850 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf (beta) 3.9 von 5 Sternen 18 Rezensionen
9 von 9 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Walks you through the steps, introduces a lot of tools 14. Februar 2013
Von Richard J. Wagner - Veröffentlicht auf
Format: Taschenbuch
This book is written in the Packt 'Cookbook' format. This means it doesn't contain a lot of theory or in-depth explanations. Rather, it contains lots of snippets telling you what to type and where to click. Most sections contain the headings:
Using (Some feature) - Tells a little about which tool you are about to use
Getting Ready - The prerequisites for using the specified utility
How to do it - Screenshots and script instructions for running the utility
How it works - A small explanation of what was done
There's more - additional explanations

To repeat that, this book is really a collection of short sections that describe how you can use various utilities in a dedicated Linux distro. So, what are the contents?

- Installing and customizing BackTrack
- Information Gathering
- Vulnerability identification
- Exploitation
- Privilege Escalation
- Wireless Networks
- Voice Over IP
- Password Cracking
- Forensics

The chapter on Forensics can serve a dual purpose. Besides helping with ethical penetration testing, this one also offers some interesting processes for other useful work: data recovery (damaged drives or deleted files) and password recovery. These can surely be useful in everyday situations.

The book contains an important warning: Used improperly, some of these tools may bring you to the attention of law enforcement agencies. But if you think carefully and act prudently, this book can be of use to someone validating their electronic defenses.
7 von 7 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good book - helped me out! 19. Februar 2013
Von L. Fesenden - Veröffentlicht auf
Format: Taschenbuch
You know, sometimes, just sometimes something fortuitous happens to me. This was one of those times.
I was contacted by my friends over at Pakt Publishing to review their new book on BackTrack. Of course I said sure. Hey, I am a Linux junkie after all! It had actually been quite a while since I had played with BackTrack and this gave me *just* the incentive I needed, but let me tell you a bit about the book...

The book is a "cookbook" style book which gives you "recipes" or guided examples of common problems/scenarios and their fixes. The book is well written, a good reference for a pro, and a great tutorial for the beginner, and by beginner I am assuming that the person *does* have Linux experience, just not BackTrack experience as some command line comfort is pretty much a necessity for this kind of work. The first 2 chapters start you out exactly the way they should, by installing and customizing the distribution. What they don't tell you is it takes a good while to actually download the distro, but that is beside the point.

Once you actually get things running well, you can follow the book through some really decent examples from Information Gathering all the way through Forensics. The book covers all matter of subject matter and applications in between such as using NMAP, Nessus, Metaspolit, UCSniff and more. I mentioned that this was fortuitous for me and that was because one of the things the book covered was the Hydra program, and, as it turns out, that was the perfect tool for me to use in remediating some password synchronization issues across several hundred servers.

Anyone using a computer should have at least a basic understanding about keeping their valuable data safe, whether that data is for a multi-million dollar company or your own invaluable family photographs. This book goes to great efforts to not only explain how to detect, analyze and remedy such issues, but also gives important background about just how systems become vulnerable to begin with. If only for that reason alone, it's worth the read. If you are actually a sysadmin, this information is a must. For $23 for the ebook version, it's a no brainer. Good book. It helped me out and I'll wager that if you give it a read it'll do the same for you!
4 von 4 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen be very careful about doing exploitations 3. Februar 2013
Von W Boudville - Veröffentlicht auf
Format: Taschenbuch
BackTrack 5 seems best suited for a very experienced linux or unix user. One who also has sysadmin background. You get an indication of this by the second chapter. It commences by explaining how to get and use kernel headers in compiling code. The kernel headers are the source code of the linux kernel itself. Another indicator is the next topic, about installing Broadcom wireless drivers. It turns out these days that a lot of computer breakins happen via wireless networks.

The book educates you on a potentially useful tool - Maltego, for threat assessment. But perhaps more apropos is the discussion on how to use Nessus. This is a common and powerful tool for finding vulnerabilities. The Nessus screen captures give you some appreciation of the many options available within it. It is ecumenical. It can detect flaws in Microsoft and linux systems and the text explains both cases.

A variant of Nessus is also explored - OpenVAS. It has the advantage of being free, unlike Nessus which charges for professional use.

Chapter 5 may be problematic to some users. It describes how to exploit vulnerabilities. Other sections of the book are about finding these. But the intellectual defence of chapter 5 is that a sysadmin can get to appreciate how a black hat might come into her system, thus giving incentive for the sysadmin to patch flaws. Even so, be careful when or if you apply this chapter. This can be like running the password breaker Crack. In some companies, doing the latter in an unauthorised way is grounds for dismissal. Likewise if using the exploitations in chapter 5, especially against a system that is not your company's.
5.0 von 5 Sternen A good book for BackTrack 5. Januar 2015
Von Michael R. Kruger - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
This is a good book for a neophyte like me. I like the "Getting Ready", "How It Works", and "How to Do It" approach. It's not just take these steps. Full of "Why's" and "How's".
2 von 2 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen These Recipes will not make you a chef nor will they make you look like one 26. August 2013
Von R1d3r - Veröffentlicht auf
Format: Kindle Edition
I'm not sure if I was just expecting too much from this book or if other readers are just not that much of a stickler about certain things but when I see that many errors (!), misspellings, inconsistencies, repetitions and simplifications of an actually quite complex topic, I start to believe that the author was just out there to make some easy money.

I was very disappointed with this book. I was pretty excited after reading all the somewhat positive reviews and I've read other "cookbook" style books before. It's definitely not the style. I was not expecting a book that explains every detail about a certain process but I was also not expecting a book that leaves out crucial steps in a process (e.g. how to get mon0 up and running for wireless hacking and that mon0 and wlan0 and not exactly the same things or simply different wireless cards like the author makes it seem). I think it's important if you want to understand that hack that you understand that you need to put your card into promiscuous mode. That could've been explained in one or two sentences but instead lots of repetitions of "requirements" that would've been enough to be mentioned once.

Also a lot of the "hacks" are portrayed to be much simpler than they actually are in real life and that's ok if the author makes the reader aware of the pitfalls and difficulties of a certain hack (I'm aware that there can't be a one-size-fits-all instruction) but this book is incorrectly giving the impression that some things are just as easy as adding a few lines in a command line and that's it. i'm sure that's good for selling books and may appease the novice hacker but only until they actually try it out in their lab.
unfortunately I returned the book and don't have access to exact wordings and examples anymore but not only does the author leave out crucial details (I can only speak for the hacks which I've done before and which I have a certain amount of experience with) but he also uses wrong information repeatedly (e.g he's referring to an example MAC address as a string of 5 hex sections like 90:3b:45:2c:12).
that certainly isn't anything you would expect in a serious book about anything, let alone on a topic where the slightest difference between an option "p" or "P" can have a big difference on the outcome of a command!

After all it's a cookbook and if nothing else, then at least the commands should be correct and consistent!

This book gave off the impression to be for a seasoned Linux user with maybe some penetration testing interests/experience but the author was spending screenshots and valuable space and time explaining how to install a Linux system on a hard drive (which I think is very basic knowledge) but then lacking explanation in areas like exploitation, meterprefer etc. which are so complex that they fill some books bit itself!

All in all the book seems to have some good information for somebody who wants to get an idea of pen testing (that's why I'm giving it 2 stars) and might give them the right things to look for and in more detail in itsec forums or other penetration testing books but there are just too many mistakes and lack of detail to take that book seriously. That plus the annoying repetitions of the same information about the "requirements" in most recipes left the bad impression that the purpose of this book was just to make the author some easy money.

I'm sorry that I can't be more specific about page numbers and exact text passages but since I've already returned the book I don't have access to it anymore and I also don't know how much of the actual content I'm allowed to reveal but I found it interesting that I was only able to see the first few and the last few pages of this book with the "look inside" feature Amazon offers.
Had I seen the pages before I would not have bought the book.
I have to say though that I really like the "look inside" feature on Amazon and it has helped me make better decisions on whether to buy a book or not.

Take care!
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.
click to open popover