Kali Linux Penetration Testing Bible
Kali Linux Penetration Testing Bible book cover

Kali Linux Penetration Testing Bible

1st Edition

Price
$23.23
Format
Paperback
Pages
512
Publisher
Wiley
Publication Date
ISBN-13
978-1119719083
Dimensions
7.38 x 1.16 x 9.25 inches
Weight
1.85 pounds

Description

From the Inside Flap Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide. Build a modern dockerized environment Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python Automate your penetration testing with Python From the Back Cover Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide. Build a modern dockerized environment Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python Automate your penetration testing with Python About the Author Gus Khawaja is an expert in application security and penetration testing. He is a cybersecurity consultant in Montreal, Canada and has a depth of experience working with organizations to protect their assets from cyberattacks. He is a published author and online educator in the field of cybersecurity. Read more

Features & Highlights

  • Your ultimate guide to pentesting with Kali Linux
  • Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work.
  • The Kali Linux Penetration Testing Bible
  • is the hands-on and methodology guide for pentesting with Kali.
  • You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide.
  • Build a modern dockerized environment
  • Build a modern dockerized environment
  • Discover the fundamentals of the bash language in Linux
  • Discover the fundamentals of the bash language in Linux
  • Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more)
  • Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more)
  • Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation
  • Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation
  • Apply practical and efficient pentesting workflows
  • Apply practical and efficient pentesting workflows
  • Learn about Modern Web Application Security Secure SDLC
  • Learn about Modern Web Application Security Secure SDLC
  • Automate your penetration testing with Python
  • Automate your penetration testing with Python

Customer Reviews

Rating Breakdown

★★★★★
60%
(121)
★★★★
25%
(50)
★★★
15%
(30)
★★
7%
(14)
-7%
(-14)

Most Helpful Reviews

✓ Verified Purchase

This sets the standard for pen testing books

I’ve been in the field for a while and have read tons of material for every level of pentester from books about just starting out of books for the seasoned professional and hands down this is one of the best penetration testing books to come out in the last decade, this could easily be up there with “Hacking: The Art of Exploitation” and others, no matter your experience you will gain something from this book and if you’re new to the field then starting with this book will put you way ahead. From network penetration testing to web apps to even shell code, Gus touches on it all and in a succinct and beautiful manner. If you are looking for a great book on pentesting, this one will not leave you disappointed.
20 people found this helpful
✓ Verified Purchase

TEACHERS: Great for High Schools teaching CyberSecurity (basics of the Linux command line & Bash!)

Students want to "learn how to hack" but often won't want to learn all the basics or build up a solid foundation of Linux experience first (they just want to run hacker GUI tools). This is a problem this book addresses.

If your HS class has done basic TCP/IP/networking.. and are ready to jump into Kali.. this does you a great service by building the missing foundations first, but under the fun "pentesting" umbrella. It does this by firming up and level setting the needed foundations like those in the first two chapters. Right off the bat in Ch1 is "Mastering the Terminal" which covers critical topics like file I/O, POSIX syntax, filesystem layouts and mounting, RDP, ssh, server/services, process mgmnt, IPs and DNS, etc.. Next up, Ch2 nudges them into "Bash Scripting" with a soild little chapter on the basics there.. Together, these first two chapters do a great job of preparing them for the remaining detailed chapters on using Linux command line.. before they deep dive into the more meaty topics of Pentesting with Kali (of which there are tons of useful HOWTO guides on the hundreds of tools baked into Kali and how to use them).

Students and teachers using this book should already have the basics of basic networking, IP addresses, CIDR notation, protocols, ping, etc. But that's about it, requirements wise.

Also.. before exposing any kid or newcomer to pentesting tools.. a quick talk on ethics is recommended. Otherwise, kids will explore, and possibly break the law while thinking it's cool. Just something to cover what NOT to do (e.g. scanning your school or neighborhood network, etc) is also recommended. I have my students sign an agreement, just to drive home the concepts and set an agreed to standard of expected behavior.

Lastly.. One note.. some of these tools ARE dangerous, so all teachers should minimally have a secured "network bubble" in which to run Kali safely.. if not an account on a popular Cyber Range system (secured, in the cloud preferably).
11 people found this helpful
✓ Verified Purchase

It's an informative read.

I bought it because it looked like a thick enough book to allow my 11 year old son to drive my truck when I am tired. I cut in half and and glued one half to each foot to help him reach the brake and gas pedals. I worked swell ! Seriously, wtf did you think I bought this book for ? It's a good book to learn about the Kali system and basics of Pen testing.
5 people found this helpful
✓ Verified Purchase

Very educational

I love this book and I highly recommend to anyone who is aspiring to become a Cyber Security professional and even somebody that is breaking into IT currently from another career field.
3 people found this helpful
✓ Verified Purchase

Uncut Pages Mid-Book

My copy of Kali Linux Penetration Testing Bible has uncut pages in the middle of the book. Someone else described the same problem as the pages being stuck together. The pages just aren't cut apart. I've been able to gingerly separate them so far. Guess this problem might be press run itself. Never had this problem with a Wiley book.
3 people found this helpful
✓ Verified Purchase

Kali penetration testing

Very detailed writings on the use of Kali Linux for pentesting. I refer to this manual often for tool usage and command line support. Well worth the price.
2 people found this helpful
✓ Verified Purchase

For starting off it’s not bad

Definitely make sure you select have some familiarity with Linux and Unix environments but other than that it is great for getting started in the Kali environment.
1 people found this helpful
✓ Verified Purchase

Purchased New | Came Quickly

I purchased my copy of this book in NEW condition.

While I'm only about 20 pages into my read so far, the author had my attention just about immediately!!

I highly recommend this title to anyone looking to expand their knowledge and/or jump into the Pen-Testing career. So far in my reads, the author has been doing a great job of explaining a lot of basics that are a must-know, just from the Linux OS side of things.

Again, I highly recommend this title! It's a great read thus far, & I'll try to remember to update my review once I've completed the rest of the book!
1 people found this helpful
✓ Verified Purchase

Came Scratched

The book came pretty Scratch, it doesn't devalue the contents.
1 people found this helpful
✓ Verified Purchase

This is the best beginner book to get.

If you have to pick up only 5 books for hacking make this your number 1.