3.180,00 EGP
Categories: Books, Computers & Technology, Operating Systems, Uncategorized
Tags: chat gpt, deep learning, software, technology
Description
Price: $31.80
(as of Feb 21,2025 08:46:19 UTC – Details)
Customers say
Customers find the book provides practical examples and exercises for penetration testing. It covers the basics of penetration testing with Kali Linux and real-world scenarios, including web applications. Readers describe it as an excellent, informative read that is not boring at all. They appreciate the clear writing style and detailed explanations on using Kali Linux for pen testing. Overall, customers consider it a valuable resource worth the price.
AI-generated from the text of customer reviews
Related products
-
Sale!
The Way Things Work: Newly Revised Edition: The Ultimate Guide to How Things Work
3.500,00 EGPOriginal price was: 3.500,00 EGP.1.834,00 EGPCurrent price is: 1.834,00 EGP. Buy Now -
Sale!
Halo Encyclopedia
4.999,00 EGPOriginal price was: 4.999,00 EGP.2.344,00 EGPCurrent price is: 2.344,00 EGP. Add to cart -
Doppelganger: A Trip into the Mirror World
0,00 EGP Add to cart -
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
0,00 EGP Add to cart
An excellent practical book for Pentesters
The Kali Linux Penetration Testing Bible by Gus Khawaja is a comprehensive and practical guide to penetration testing with Kali Linux. I, as a serious reader find it really designed to help both beginners and experienced security professionals learn how to use Kali Linux to identify and exploit vulnerabilities in computer systems.The book is divided into three main parts:1. Fundamentals of Penetration Testing:This part covers the basics of penetration testing, including the different types of attacks, the tools and techniques used, and the legal and ethical considerations.2. Kali Linux Tools and Techniques: This part covers the most important tools and techniques in Kali Linux, including information gathering, vulnerability scanning, exploitation, and post-exploitation.3. Real-World Scenarios: This part covers a variety of real-world scenarios,including web application penetration testing, wireless network penetration testing, and social engineering..The book is well-written and easy to understand, and it is packed with practical examples and exercises. It is also up-to-date with the latest Kali Linux tools and techniques.Here are some of the strengths of the Kali Linux Penetration Testing Bible:⢠Comprehensive coverage of Kali Linux: The book covers everything you need to know about Kali Linux, from the basics to the most advanced tools and techniques.⢠Practical and hands-on: The book is full of practical examples and exercises that will help you learn how to use Kali Linux to identify and exploit vulnerabilities.â¢Up-to-date: The book is up-to-date with the latest Kali Linux tools and techniques.Overall, I find the Kali Linux Penetration Testing Bible is an excellent resource for anyone who wants to learn how to use Kali Linux for penetration testing. It is comprehensive, practical, and up-to-date, and it is written in a clear and easy-to-understand style.Best regardsDr. Shibu Valsalan
good book
informative and very useful
Good Read and Reference guide
I haven’t finished it yet but looking at the index and reading the first couple chapters it seems a lot covered is on par with what I learned in IT coursework. I will say if you are completely new then work alongside the book actually do each thing in Kali practice them real world until you understand each thing. Things like the intro to bash shell commands will be invaluable to practice and master in using any Linux distro. Overall I like the pace not drilling but to the point suggestive of what is important to know and concepts are explained with examples.
This sets the standard for pen testing books
Iâve been in the field for a while and have read tons of material for every level of pentester from books about just starting out of books for the seasoned professional and hands down this is one of the best penetration testing books to come out in the last decade, this could easily be up there with âHacking: The Art of Exploitationâ and others, no matter your experience you will gain something from this book and if youâre new to the field then starting with this book will put you way ahead. From network penetration testing to web apps to even shell code, Gus touches on it all and in a succinct and beautiful manner. If you are looking for a great book on pentesting, this one will not leave you disappointed.
TEACHERS: Great for High Schools teaching CyberSecurity (basics of the Linux command line & Bash!)
Students want to “learn how to hack” but often won’t want to learn all the basics or build up a solid foundation of Linux experience first (they just want to run hacker GUI tools). This is a problem this book addresses.If your HS class has done basic TCP/IP/networking.. and are ready to jump into Kali.. this does you a great service by building the missing foundations first, but under the fun “pentesting” umbrella. It does this by firming up and level setting the needed foundations like those in the first two chapters. Right off the bat in Ch1 is “Mastering the Terminal” which covers critical topics like file I/O, POSIX syntax, filesystem layouts and mounting, RDP, ssh, server/services, process mgmnt, IPs and DNS, etc.. Next up, Ch2 nudges them into “Bash Scripting” with a soild little chapter on the basics there.. Together, these first two chapters do a great job of preparing them for the remaining detailed chapters on using Linux command line.. before they deep dive into the more meaty topics of Pentesting with Kali (of which there are tons of useful HOWTO guides on the hundreds of tools baked into Kali and how to use them).Students and teachers using this book should already have the basics of basic networking, IP addresses, CIDR notation, protocols, ping, etc. But that’s about it, requirements wise.Also.. before exposing any kid or newcomer to pentesting tools.. a quick talk on ethics is recommended. Otherwise, kids will explore, and possibly break the law while thinking it’s cool. Just something to cover what NOT to do (e.g. scanning your school or neighborhood network, etc) is also recommended. I have my students sign an agreement, just to drive home the concepts and set an agreed to standard of expected behavior.Lastly.. One note.. some of these tools ARE dangerous, so all teachers should minimally have a secured “network bubble” in which to run Kali safely.. if not an account on a popular Cyber Range system (secured, in the cloud preferably).
Kali penetration testing
Very detailed writings on the use of Kali Linux for pentesting. I refer to this manual often for tool usage and command line support. Well worth the price.
Not as thorough as I had hoped
Useful, yet not really as thorough as I had hoped it would be. Still, helped give me the confidence to set everything up and to retest penetration test findings (for free) before paying to retest just to find out I didn’t fully resolve the issue, and then having to pay to retest yet again. So yeah, it’s saved me thousands of dollars (well, saved my employer), so well worth it.
Im cruisin right through it.
I have a Kali VM set up just for this book and am loving this book. It is very informative thus far and an exellent read.
Livro de cabeceira para quem deseja ser pentester
muy bueno
Wil je beginnen met pentesten. Dan is dit boek een aanrader
A great way to learn about the subject.
The book is a good resource/reference book for novices and mid users