Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite
, Fourth Edition
Explore red teaming and play the hackers game to proactively defend your infrastructure
Use OSINT, Google dorks, Nmap, recon-nag, and other tools for passive and active reconnaissance
Learn about the latest email, Wi-Fi, and mobile-based phishing techniques
Description
Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you’ll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You’ll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances.
This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lateral movement, privilege escalation, and command and control (C2) on compromised systems.
By the end of this book, you’ll have explored many advanced pentesting approaches and hacking techniques employed on networks, IoT, embedded peripheral devices, and radio frequencies.
Who is this book for?
This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.
What you will learn
Exploit networks using wired/wireless networks, cloud infrastructure, and web services
Learn embedded peripheral device, Bluetooth, RFID, and IoT hacking techniques
Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools
Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec
Perform cloud security vulnerability assessment and exploitation of security misconfigurations
Use bettercap and Wireshark for network sniffing
Implement complex attacks with Metasploit, Burp Suite, and OWASP ZAP
The book's extensive coverage, from network reconnaissance to post-exploitation strategies, resonated with the challenges I face in my day-to-day work. I found the inclusion of real-world scenarios invaluable. It's this blend of theory and practice has directly impacted my performance in the field.While the book assumes a foundational knowledge of networking and cybersecurity, you will run into issues whilst setting up the infrastructure, it will increase your ability to understand the basics clearly. This book is a mentor in the world of ethical hacking, which transforms knowledge into actionable expertise.
Amazon Verified review
Manjunath VeluMar 02, 2024
5
Great book for my pent testing collection! Absolutely recommended for those who know how to set up and a good computer in hand.
Amazon Verified review
MichaelMar 06, 2022
5
As someone that has just recently done the Offensive Security OSCP course, I have been relying on many different resources, primarily as each does not quite consolidate the information required to gain knowledge in this area.This book is well written and captures many areas that now are consolidated into one title.It will satisfy the beginner, to the more knowledgeable, and I am sure even experts would learn one or two things from this book. Certainly its up to date and covers new areas that many other resources do not, many of which start to seem a little dated.Whether learning from zero point or you need a fresher or reference manual, this is a decent worthwhile book to have in your weaponry.
Amazon Verified review
Adrian SantangeloMay 06, 2022
5
I've been a security professional since the late 90's and read my fair share of books. I found "Mastering Kali Linux for Advanced Penetration Testing" to be easy to follow, choked FULL of useful info, and a flow you could follow. It's rare to find a technical book that can talk about so much, yet hold interest. And the linked files are well done and match up correctly.If I had to give it any criticism, it would only be that for an "advanced book" it dabbles in some beginner terms and areas that one may be already expected to know. But in some cases, that is also a feature, not a bug! For beginners, it gives enough background for them to follow along. Many areas are captured, resources are current, and the in-deppt concepts are well organized and explained.Highly recommend grabbing your own copy, again, regardless of skill level.
Amazon Verified review
Katherine Linville-MeeceMay 28, 2022
5
First off, I would like to say, Vijay Kumar is a brilliant author. In this book he talks about advance pentesting approaches, different hacking techniques and much more. For someone who has been in the IT/Cyber industry for the past 10 years I can say this book is very well written and easy to understand even for a beginner to read. If you are wanting to become a Cybersecurity ethical hacking expert I would highly recommend this book!! - CyberTechDave
Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has 16+ years of IT industry experience, is a licensed penetration tester and is specialized in providing technical solutions to diverse cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a few books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing – Second & Third Editions, and Mobile Application Penetration Testing. For the community, Vijay serves as the chair member of NCDRC, India. When not working, he enjoys playing music and doing charity work.
Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.
If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.
Please Note: Packt eBooks are non-returnable and non-refundable.
Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:
You may make copies of your eBook for your own use onto any machine
You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website?
If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:
Register on our website using your email address and the password.
Search for the title by name or ISBN using the search option.
Select the title you want to purchase.
Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook?
If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
To view your account details or to download a new copy of the book go to www.packtpub.com/account
Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.
You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.
What are the benefits of eBooks?
You can get the information you need immediately
You can easily take them with you on a laptop
You can download them an unlimited number of times
You can print them out
They are copy-paste enabled
They are searchable
There is no password protection
They are lower price than print
They save resources and space
What is an eBook?
Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.
When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.
For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.