- Taschenbuch: 260 Seiten
- Verlag: Packt Publishing (15. Oktober 2013)
- Sprache: Englisch
- ISBN-10: 1783289597
- ISBN-13: 978-1783289592
- Größe und/oder Gewicht: 19 x 1,5 x 23,5 cm
- Durchschnittliche Kundenbewertung: 2 Kundenrezensionen
- Amazon Bestseller-Rang: Nr. 111.509 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
Kali Linux Cookbook (Englisch) Taschenbuch – 15. Oktober 2013
|Neu ab||Gebraucht ab|
Wird oft zusammen gekauft
Kunden, die diesen Artikel gekauft haben, kauften auch
Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.
Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.
Über den Autor und weitere Mitwirkende
Willie L. Pritchett
Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.
David De Smet
David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.
Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
I really expected more...
"How it works..." sections explain nothing.
Complex commands are presented with no background or explanation of their purpose or arguments.
If I could return this book, I would.
A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.
As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
Know the enemy.
Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.
Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.
The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.
This de facto survey of the penetration field is a virtue of Kali.