Kali Linux Cookbook and over one million other books are available for Amazon Kindle. Learn more
Buy New
$37.79
Qty:1
  • List Price: $41.99
  • Save: $4.20 (10%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $18.90
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Kali Linux Cookbook Paperback – October 15, 2013


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$37.79
$37.79 $51.00

Frequently Bought Together

Kali Linux Cookbook + Web Penetration Testing with Kali Linux + Hacking with Kali: Practical Penetration Testing Techniques
Price for all three: $117.59

Buy the selected items together

If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 80%). Print edition purchase must be sold by Amazon. Learn more.


Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 260 pages
  • Publisher: Packt Publishing (October 15, 2013)
  • Language: English
  • ISBN-10: 1783289597
  • ISBN-13: 978-1783289592
  • Product Dimensions: 0.6 x 7.4 x 9.1 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 1.6 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #589,819 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

1.6 out of 5 stars
5 star
0
4 star
0
3 star
0
2 star
3
1 star
2
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 3 people found the following review helpful By Jurandir on February 20, 2014
Format: Paperback Verified Purchase
The examples do not match, there are many mistakes... wrote to the author, no reply... disappointed !

I really expected more...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Jake on February 9, 2014
Format: Kindle Edition Verified Purchase
Nothing is explained, horrible writing with plenty of errors. Save your money and look at some other similar books on Kali.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 4 people found the following review helpful By Amazon Customer on January 24, 2014
Format: Kindle Edition Verified Purchase
Poorly written !!!

"How it works..." sections explain nothing.

Complex commands are presented with no background or explanation of their purpose or arguments.

If I could return this book, I would.

A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.

As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Torrez on March 29, 2014
Format: Kindle Edition Verified Purchase
This particular book does not detail the recipes enough with explanation to what's going on it seems to skim over a lot of details...Still searching for something superior to this ...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
The back cover sounds like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search

What Other Items Do Customers Buy After Viewing This Item?