Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Basic Security Testing with Kali Linux Paperback – January 5, 2014
2016 Book Awards
Browse award-winning titles. See all 2016 winners
Customers Who Bought This Item Also Bought
If you’re the author, publisher, or rights holder of this book, let ACX help you produce the audiobook.Learn more.
Top Customer Reviews
Things I appreciated about this book:
* Nice screen shots - some have complained that they are black and white but I didn't care. They are clear and easy to read. Great job of giving us a visual.
* Writing is easy to read - The author doesn't try to talk over your head. Much appreciated.
* Social Engineering toolkit chapters are a great introduction to the SET capability
* Covers a variety of topics including social engineering, wireless exploits, and metasploit.
Where the book falls short:
* Some of the chapters were already outdated. For instance, I couldn't get Veil to work at all after two hours of troubleshooting, updating, reading web forums...etc. Metasploit google search was non-existant... Dmitry didn't work....etc. I understand that the author can't control when and how Kali updates, but it rendered certain portions of the book worthless.
* The Windows privilege escalation chapter(s) are a huge foul. He starts under the premise that you have a meterpreter session with a Windows 7 box, however doesn't show you how to do this. Windows 7 is not easily penetrable and since this is a "Basics" book, I would have expected the author to walk us through this or at least give us an idea of what exploit he ran.
* Would have liked more depth in most/all of the topics.
* Needs some exercises to reinforce learning.
This book attempts to find the hard-to-reach ground of being a beginner book, while also giving depth for clarity, and breadth of information. However, in my opinion it doesn't quite get there.
Do yourself a favor and get a nice lab set up prior to going through the book. This book doesn't just go over obvious exploitable machines, but also does some great work on social engineering to get into more properly hardened machines, such as Win 7.
The pictures were very helpful and Mr. Dieterle's writing style is easy to follow. We went through just about every book for beginners to moderately experienced pen testers and this one was just the right balance for us.
Thanks Daniel for the great starter and easy to follow practice examples. My students love it!
The writing is excellent, and the coverage that is there, which is at a expert level of depth (though written in such a way that a beginner can grasp), is solid. In addition, security is something you have to work at, so having an introduction to get you down the road is a good idea anyway. This is a solid walkthrough of Kali Linux security.
The bad: Because it includes many tools, each tool may have simple example or introduction. You won't have a step by step guide. The book quality feels like a printout, not a book.
Most Recent Customer Reviews
have learned a lot, good book to help with learning Kali LinuxPublished 7 months ago by John Johnson
Very nice beginners guide to using Kali. I felt it was well worth the money and time reading it and enjoying it. Read morePublished 7 months ago by Curtis