The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting

4.180,00 EGP

Description

Price: [price_with_discount]
(as of [price_update_date] – Details)


[ad_1]

[ad_2]

This Post Has 13 Comments

  1. El-Melik El-Nasır Ebu'l Muẓaffer Selahaddin Yûsûf bin Necmeddin Eýýub says:

    Book and Amazon support awesome; delivery awful…
    The title says everything:That book is awesome; but bad packed. The result was predictable: When I received it, ¡the book was damaged!But thanks to Amazon they gifted me that so I did not have to look for an DHL Express store where I could send it back and buy the transformator which I needed quite quickly even I did not have the money for that at the time…¡Thank you very much for your help and support!¡I appreciate that!

  2. Nice book with examples to follow along
    Just be aware that all examples in the book are based on using a Windows virtual machine to run Kali and set up a virtual testing network. So if you are like me and avoid Windows like the plague be prepared to buy a cheap mini PC running Windows to be able to work through the examples verbatim, or to spend some time figuring out how to adapt what he is doing to another system. Overall and awesome book.

  3. Clear, concise and a much preferred read over other study materials for the subject matter.
    The Ultimate Kali Linux Book – Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting 3rd ed. Edition by Glen D Singh is a comprehensive guide to ethical hacking and penetration testing with Kali Linux. I originally purchased the Audible edition to study for thne Comptia Pentest + exam as adjunct material to Comptia study guides. The audio helped to reinforce topics for study. This prompted me to order a kindle copy and I read through for further reinforcement of command and concepts. The book is excellent for those new to advanced in Kali Linux. The author uses real-world scenarios to explain and explore penetration testing concepts. This is done by a step by step of setting up a pentest lab using virtual machines.Exercises focus on reconnaissance, Open-source intelligence gathering, asset and network discovery techniques and how to use/commands for tools in Kali Linux which can target systems, perform vulnerability assessments, perform social engineering attacks, identify security flaws on devices, exploit security weaknesses to gain access, persistence, command and control and data extraction. Compromise of Active Directory and enterprise network exploitation and red teaming is covered on wired and wireless networks as well as explanation of how to exploit vulnerable web applications.Tools covered include Nmap, Metasploit, Aircrack-ng, the Harvester, SET Toolkit and many other Kali Tools and Applications. I highly recommend this for learning, reinforcing for Pentest exams and as a shelf reference guide.The authors’ concise, well elaborated and easy to follow explanations make this a comfortable read. After reading this and using it as study , I would happily purchase the authors’ future books as he is clearly accomplished as an instructor and author.

  4. no lo he terminado de leer pero las versiones de los programas que utiliza están actualizadas de momento todo funciona según lo previsto.

  5. El libro llegó íntegro y no dudo que el contenido pueda aportar algo al conocimiento de ciberseguridad.

Leave a Reply

Your email address will not be published. Required fields are marked *