Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually. If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.
A solid introduction to Penetration Testing with Kali Linux. Practical instructions on how to use the various tools in a test environment, and the various phases such as methodology, reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation and maintaining access are all covered. There is also a chapter on how to report and communicate findings to different levels of resources in the organization.
Kali Linux is a rising star among Linux distros. As successor of Backtrack, its popularity as penetration test distro is increasing. But today, I won't talk about Kali Linux. This post will talk about a book for people who are interested in network security, especially in penetration testing area. PacktPub released a book titled Kali Linux – Assuring Security by Penetration Testing. If you're new to Kali or maybe Linux itself but interested in penetration testing, this book is for you. The book tell us from how to install Kali Linux to the installed tools and how to use them.
But if you have read a book titled "Backtrack 4 – Assuring Security by Penetration Testing", you might be a bit disappointed. Most content of those books are same. Especially early chapter in the book. From my point of view, the only differences between them are the explained tools. Some of them are new in Kali Linux, but some old but gold tools from Backtrack are missing.
If you haven't read the Backtrack book, I recommend reading the 2nd and 3rd chapter, which talked about penetration testing methodology. Thus if someone were ordered you to pentest their system, you would know what to do first. After you read this book for a while, you could pay attention to 11th chapter at web backdoors sub chapter. It is additional topic in this book, compared to the Backtrack book. Unfortunately, those tools are not explained in detail. You should read from other references, if you want to know more.
The book focuses on developing penetration testing skills for ensuring complete security in the network environment. If you are an IT security professional, with a basic knowledge of Unix/Linux operating systems then the book is ideal instrument to prevent vulnerabilities in the network, The book is fully focused on guiding you to develop practical penetrating testing skills by demonstrating step by step the hacker tools and techniques. The book starts with lab techniques and testing procedures, giving a detailed explanation on the basic installation and configuration set up, discussing different types of penetration testing methodologies and proposing the Kali Linux specific testing process. A number of security assessment tools for conducting penetration testing in different categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering exploitation, privilege escalation,, maintaining access and reporting) have been discussed, following formal testing methodology. The authors Lee Allen and Tedi Heriyantohave both combined together to give a complete treatise on complete security in your network system. http://www.packtpub.com/kali-linux-as...
Kali Linux is one of the most advanced and versatile penetrating testing distribution ever created. It is a Debian derived Linux distribution designed for digital forensics and penetration testing. Kali Linux, it may be added, is a GPL-compliant Linux distribution built by penetration testers for penetration testers with development staff consisting of individuals spanning different languages, regions, industries, and nationalities. Lee Allen,Tedi Heriyanto and Shakeel Ali have, painstakingly revealed the industry’s best approach for logical and systematic penetrating testing process. The book starts from the basics – lab penetration and testing procedures – and goes on to elaborate about the basic installation and configuration set up, discussing different types of penetration testing, uncovering open security testing methodologies and proposing Kali Linux specific testing process. It is a ‘must go through’ book for IT security professionals. However, they must have a basic knowledge of Unix/Linux operating systems. They must also have an awareness of information security factors. http://www.packtpub.com/kali-linux-as...
A great introductory practical tutorial. Provides valuable information with good amount of detail on using Kali for security and penetration tests. One of the greatest benefits of using Kali is the packages of tools which comes with it. This book does a good job on covering topics like exploitation and security vulnerabilities using tools like Metasploit. Additionally covers number of other tools and their uses such as: Wireshark, Nessus and Nmap. Overall a solid book with good flow and good selection topics. Only critique (personal) I would say that the book is a hefty size and really gets useful after chapter 4, it is quite broad and takes an introductory approach, but it had potential to explore concepts in more depth and cover the real difficulties in this field, but for an introductory useful reference to security and penetration tests, this book is a great place to start. http://www.packtpub.com/kali-linux-as...
Had some time over the holiday to finish my review copy of Kali Linux – Assuring Security by Penetration Testing, which is Ppobably one of the better beginner/intermediate Kali books.
This book covers a lot of ground and lays down a solid foundation for discovery, enumeration, vulnerability assessment, exploitation, persistence, and reporting. It covers a lot of the basic tools like nmap, wireshark, metasploit, openvas,and burp as well as going into some of the fuzzers, MITM attacks, escalation and more.
The only thing that would make this book perfect is if the author got rid of the first two chapters (downloading,installing,configuring, etc) and condensed the chapters on penetration testing methodologies and reporting together.