Book and Amazon support awesome; delivery awfulâ¦
The title says everything:That book is awesome; but bad packed. The result was predictable: When I received it, ¡the book was damaged!But thanks to Amazon they gifted me that so I did not have to look for an DHL Express store where I could send it back and buy the transformator which I needed quite quickly even I did not have the money for that at the timeâ¦Â¡Thank you very much for your help and support!¡I appreciate that!
Nice book with examples to follow along
Just be aware that all examples in the book are based on using a Windows virtual machine to run Kali and set up a virtual testing network. So if you are like me and avoid Windows like the plague be prepared to buy a cheap mini PC running Windows to be able to work through the examples verbatim, or to spend some time figuring out how to adapt what he is doing to another system. Overall and awesome book.
Clear, concise and a much preferred read over other study materials for the subject matter.
The Ultimate Kali Linux Book – Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting 3rd ed. Edition by Glen D Singh is a comprehensive guide to ethical hacking and penetration testing with Kali Linux. I originally purchased the Audible edition to study for thne Comptia Pentest + exam as adjunct material to Comptia study guides. The audio helped to reinforce topics for study. This prompted me to order a kindle copy and I read through for further reinforcement of command and concepts. The book is excellent for those new to advanced in Kali Linux. The author uses real-world scenarios to explain and explore penetration testing concepts. This is done by a step by step of setting up a pentest lab using virtual machines.Exercises focus on reconnaissance, Open-source intelligence gathering, asset and network discovery techniques and how to use/commands for tools in Kali Linux which can target systems, perform vulnerability assessments, perform social engineering attacks, identify security flaws on devices, exploit security weaknesses to gain access, persistence, command and control and data extraction. Compromise of Active Directory and enterprise network exploitation and red teaming is covered on wired and wireless networks as well as explanation of how to exploit vulnerable web applications.Tools covered include Nmap, Metasploit, Aircrack-ng, the Harvester, SET Toolkit and many other Kali Tools and Applications. I highly recommend this for learning, reinforcing for Pentest exams and as a shelf reference guide.The authors’ concise, well elaborated and easy to follow explanations make this a comfortable read. After reading this and using it as study , I would happily purchase the authors’ future books as he is clearly accomplished as an instructor and author.
Good book
Good book to have.
Book and Amazon support awesome; delivery awfulâ¦
The title says everything:That book is awesome; but bad packed. The result was predictable: When I received it, ¡the book was damaged!But thanks to Amazon they gifted me that so I did not have to look for an DHL Express store where I could send it back and buy the transformator which I needed quite quickly even I did not have the money for that at the timeâ¦Â¡Thank you very much for your help and support!¡I appreciate that!
Teach Kali Linux
A must-read book to get a clear understand of Kali Linux
Nice book with examples to follow along
Just be aware that all examples in the book are based on using a Windows virtual machine to run Kali and set up a virtual testing network. So if you are like me and avoid Windows like the plague be prepared to buy a cheap mini PC running Windows to be able to work through the examples verbatim, or to spend some time figuring out how to adapt what he is doing to another system. Overall and awesome book.
Learn
Â
Just started
Just started reading but wow… Tons of info!
Very Comprehensive and Current
Clear explanations, diagrams, and tutorials
Clear, concise and a much preferred read over other study materials for the subject matter.
The Ultimate Kali Linux Book – Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting 3rd ed. Edition by Glen D Singh is a comprehensive guide to ethical hacking and penetration testing with Kali Linux. I originally purchased the Audible edition to study for thne Comptia Pentest + exam as adjunct material to Comptia study guides. The audio helped to reinforce topics for study. This prompted me to order a kindle copy and I read through for further reinforcement of command and concepts. The book is excellent for those new to advanced in Kali Linux. The author uses real-world scenarios to explain and explore penetration testing concepts. This is done by a step by step of setting up a pentest lab using virtual machines.Exercises focus on reconnaissance, Open-source intelligence gathering, asset and network discovery techniques and how to use/commands for tools in Kali Linux which can target systems, perform vulnerability assessments, perform social engineering attacks, identify security flaws on devices, exploit security weaknesses to gain access, persistence, command and control and data extraction. Compromise of Active Directory and enterprise network exploitation and red teaming is covered on wired and wireless networks as well as explanation of how to exploit vulnerable web applications.Tools covered include Nmap, Metasploit, Aircrack-ng, the Harvester, SET Toolkit and many other Kali Tools and Applications. I highly recommend this for learning, reinforcing for Pentest exams and as a shelf reference guide.The authors’ concise, well elaborated and easy to follow explanations make this a comfortable read. After reading this and using it as study , I would happily purchase the authors’ future books as he is clearly accomplished as an instructor and author.
no lo he terminado de leer pero las versiones de los programas que utiliza están actualizadas de momento todo funciona según lo previsto.
This book is a must for those who wants to learn how to hack!
Super!
El libro llegó Ãntegro y no dudo que el contenido pueda aportar algo al conocimiento de ciberseguridad.
Upto date and easy to follow