This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, and documentation of penetration testing by building on your understanding of Kali Linux and wireless concepts.
Most of the professionals / security enthusiasts / Researchers are well-aware with the Penetration Testing Platform - 'Kali Linux' which is a newer version of the Backtrack Framework. For a Security professional it is of utmost importance to know this platform, this book is a good resource for getting introduced to various tools and their working mechanics. The author in this book has very well conveyed the a b c.... of the kali linux, including ups & downs of a penetration testing.
The follwing are the Pros & Cons I came across while reading this book: Pros: - Simplicity - a novice user can just follow the chapters with the kali linux installed in the system, the screen shots prove very much useful and decrease the initial learning curve on the topic. - 'The attackers kill - chain' Explained Excellently. The phases of recon and information gathering, which are vital for any successful attack are shown here quite nicely. - An overview of most famous tools such as Nmap, Metasploit framework, recon-ng framework is given to help readers know and explore these tools. - Extra tools that can be used in every phase of the kill chain are shown that adds more fun to learning. - Clear and simple understanding of the matters related to security. - The part of 'exploit' & 'attack' is interesting and fun to learn.
Cons: - Very little info on 'Maltego' is provided, expected some more on Maltego, so that more features and power of maltego can be demonstrated. - Info on some more tools could have been given.
To Sum up, this book can prove to be a very useful resource to anyone who is interested in information security / Penetration Testing, Security Professional for sharpening their skills. Also, for System Administrators / IT managers this book can benefit them as they will know the possible attack vectors and patch them if they find before a 'Black Hat' does.