Your rating(Clear)Rate this item


There was a problem filtering reviews right now. Please try again later.

16 of 16 people found the following review helpful
on February 11, 2014
Format: Kindle Edition
As a college student majoring in computer science, I have a strong interest in security and penetration testing. After looking around for a while for a good book to get me started, I settled on The Basics of Hacking and Pentesting, and I am very glad I did so. It was a great introduction to not only the tools involved in pentesting, but the concepts and techniques behind those tools, so you actually know how and why you are doing things.

The author takes you through setting up a great testing environment, and then proceeds to introduce every step of a successful penetration test, including all the tools and techniques. After reading this book, I have not only a solid foundation on and understanding of the tools and techniques of pentesting, I now know exactly what to research and learn further so that I can master those techniques.

Overall an excellent book for anyone looking to get into security and pentesting and one I would highly recommend.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
10 of 11 people found the following review helpful
on March 23, 2014
Format: PaperbackVerified Purchase
The book is very readable compared to other technical books. The writer is clearly a teacher who understands how to keep a reader's attention while providing useful, real world information. As of now, this book seems very up-to-date. It as published recently and has what I have read in other resources are commonly used tools in the industry.

I read the whole book and took copious notes due to my upcoming certification tests and interest in hacking. I used the tools in at least the 1st half of the book. I will update this review once I use the tools listed in the 2nd half of the book. As the book recommended, I downloaded Oracle VMWare, Kali-Linux and Metaspoitable. Don't be intimidated by these tasks -> Oracle VMWare is a piece of cake to install, and booting up two machines with Kali (which is the attacking machine) and Metasploitable (the woefully unprotected target machine) are pretty simple, too. All of these products are free. Preparing this test bed is your key to understanding and enjoying much of the material in this book. It also allows you to 'own' a system pretty simply, so you can get a feel for the core tasks in hacking.

As an example of success using tools and instructions in this book, I used nmap, a scanner, from the Kali virtual machine against the Metasploitable virtual machine, determined a vulnerability and associated exploit, and built and executed it using Metasploit, an exploit development and delivery platform. I consider this my first hack, and although it was made a breeze to do for the sake of learning as quickly as possible, I am still proud!!! It might be awhile before I give a presentation at Defcon, though ;-)

I have been a database developer for twenty years, working in various industries such as human resources, benefits and government, so I am not new to programming, but I think someone without programming training or experience should do fine with this book. The certifications I will be taking are Certified Ethical Hacker and Offensive Security Certified Professional.
44 commentsWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
24 of 31 people found the following review helpful
on August 23, 2013
Format: Paperback
Yes, Kali Linux is the follow-up release of "Backtrack R3" from 2012, while Kali was released in ~March of 2013. Which is why you won't hear much about Backtrack, since it is now Kali. Sounds like a misinformed script kiddy who places more weight on tools than on knowledge which will get him far.... considering that this specific topic (Backtrack R3 -> Kali) is a fairly well-known fact and can be located in Google very easily. So anyone reading the initial reviewer's comment, please do not be swayed by his lack of knowledge. This is a great book that will help put you on the right track, but that track is a lot more than simply learning how to "use a tool" or running "a fill in the blank" scan, and clicking magic button. A novice approach such as what one would likely conclude from the original reviewer's lack of highly available knowledge in the field will only serve you problems should you get caught. You should always work on your own equipment and labs and/or with written and explicit authorization of the equipment of others specific to the scope of what activities will be taken. If you are serious about learning and actually entering in to the field; be forewarned it is massive and daunting, however, if you take it one step at a time and get a broad overview of the landscape first, you can begin to layout and map your path with regards to the various topics you will want to learn in the most logical manner possible. While I am far from "experienced" myself, it is a rewarding field that will likely become exponentially more rewarding and important with the growing array of expansive impacts to fields that have largely not been synonymous with Network or Information Security. For instance privacy, politics, foreign and domestic relations, government activity and oversight (or lack thereof), internal business practices and policies and will continue to further shape the way we communicate, do business and live our lives day-to-day. These impacts will likely only continue to grow, while ethical hackers and proper penetration testing is performed to maintain a balance with the ultimate goal of securing personal information, IP, and other assets.... To find more information on such paths, you can look into the various security certifications and domains of knowledge they cover as a means to get you started with some of what you will want to begin learning.... thanks to Michael for clarifying the issue. :o)
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
7 of 8 people found the following review helpful
on August 26, 2013
Format: PaperbackVerified Purchase
I think this book is a great resource for beginners as it states. Although not completely a beginner, it is a great refresher for me to read and reference so that's wont lose the basics as I delve deeper into this field. Although you may be able to look things up online with Google as another post states, you need to know what you're looking up and this could be a good guide. This book is for beginners and not meant to further intermediary knowledge although its nice have.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
4 of 5 people found the following review helpful
on August 22, 2013
Format: PaperbackVerified Purchase
This is book is exactly what it advertises. It a basic starting point for anyone who is interested in hacking and pen testing. The book is organized by phases of the attack from recon to wrap up. The basics! Its really light on fluff and whets your appetite for more. If you want more in depth analysis of the tools and techniques used, google and youtube are your friends here. Happy hunting!
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful
on October 5, 2014
Format: PaperbackVerified Purchase
This is a very good introduction to a method of penetration testing. It's called "basics" for a reason. It's short compared to most introductory books on this topic, but it makes the information a bit more digestible. It gently walks you through, in broad strokes, the process of a "typical" pen test. It's written in a non-technical style, so it's easier to understand for the newcomer.

The book does not go in-depth with many of the topics. It wouldn't be feasible, and then it wouldn't be an intro book anymore. There are books dedicated to just protocols alone. So if you are hoping for more explanations or tutorials on understanding things like TCP/IP - this is not it.

What I like best about this is that it assumes you have virtually no knowledge of the security field, can operate a computer with some skill, and understand how to follow directions. The high-level view is really best for the true novice, and helps to take away some of the intimidation of the field.

The downside, as is any technical book based on technology/internet, is that the information can get outdated or become inaccurate in a hurry. With a page limit for this kind of book, the author has to selectively choose what sources and references will appear in relation to the topic. The core principles stay the same, regardless, so don't get too upset if a site that's listed as an example is no longer functioning or the commands in bash have changed.

And one tangential bit/words of encouragement: if you are interested in infosec/cyber security but have no "formal" training/education, don't be afraid. Try it out. Something like this takes time and practice to get good at. (But also don't become a tool jockey - a good pen tester is well-rounded and is constantly adapting.)
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 2 people found the following review helpful
on January 7, 2014
Format: PaperbackVerified Purchase
This book is awesome! It is a sort of "bible" for learning what pen testing is all about. Each paragraph has something new to consider or a tool to use for a certain purpose. If you wan to know about pen testing from the get go buy this book!
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 2 people found the following review helpful
on October 21, 2013
Format: PaperbackVerified Purchase
I bought this book for a graduate level class, but I may also continue on and go for the Ethical Hacker Certification. I think this book will really help out in that arena.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful
on August 24, 2014
Format: Paperback
The author doesn't lie that this book covers is the BASICS of hacking and pen testing. I am just starting out in the security field of IT and after reading this book I didn't get very much out of it. If you have been doing some research on your own, or already have security as a passion of yours, you might not get a ton out of this book. I am studying for my OSCP Certification and thought this would be a good intro. It was helpful in some areas but after reading it, I wish I learned more from it. It is easy to read and follow.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 4 people found the following review helpful
on April 21, 2014
Format: Kindle EditionVerified Purchase
Too basic for me. Wasn't what I was looking for. There are a hundred tutorials out there that will give you an explanation of this material but for free. That said, it would be a useful manual for someone that has no experience at all. It is professional, organized and well written. However, if you have already installed and run used BT5 or Kali, and done a couple of pen-tests you probably will get a better value out of a more advanced book.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
     
 
Customers who viewed this also viewed
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim (Paperback - March 13, 2014)
$22.49

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson (Paperback - February 4, 2008)
$28.97

Rtfm: Red Team Field Manual
Rtfm: Red Team Field Manual by Ben Clark (Paperback - February 11, 2014)
$10.00
 
     

Send us feedback

How can we make Amazon Customer Reviews better for you?
Let us know here.

Your Recently Viewed Items and Featured Recommendations 
 

After viewing product detail pages, look here to find an easy way to navigate back to pages you are interested in.