Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
The Ultimate Kali Linux Book
The Ultimate Kali Linux Book

The Ultimate Kali Linux Book: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire , Second Edition

eBook
€22.99 €32.99
Paperback
€41.99
Audiobook
€34.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want

Key benefits

  • Learn to compromise enterprise networks with Kali Linux
  • Gain comprehensive insights into security concepts using advanced real-life hacker techniques
  • Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment
  • Purchase of the print or Kindle book includes a free eBook in the PDF format

Description

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.

Who is this book for?

This pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.

What you will learn

  • Explore the fundamentals of ethical hacking
  • Understand how to install and configure Kali Linux
  • Perform asset and network discovery techniques
  • Focus on how to perform vulnerability assessments
  • Exploit the trust in Active Directory domain services
  • Perform advanced exploitation with Command and Control (C2) techniques
  • Implement advanced wireless hacking techniques
  • Become well-versed with exploiting vulnerable web applications

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 24, 2022
Length: 13hrs 47mins
Edition : 2nd
Language : English
ISBN-13 : 9781837632473
Category :
Concepts :
Tools :

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want

Product Details

Publication date : Feb 24, 2022
Length: 13hrs 47mins
Edition : 2nd
Language : English
ISBN-13 : 9781837632473
Category :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 115.97
Mastering Kali Linux for Advanced Penetration Testing – Fourth Edition
€41.99
The Ultimate Kali Linux Book
€41.99
Cybersecurity – Attack and Defense Strategies, 3rd edition
€31.99
Total 115.97 Stars icon

Table of Contents

22 Chapters
Section 1: Getting Started with Penetration Testing Chevron down icon Chevron up icon
Chapter 1: Introduction to Ethical Hacking Chevron down icon Chevron up icon
Chapter 2: Building a Penetration Testing Lab Chevron down icon Chevron up icon
Chapter 3: Setting Up for Advanced Hacking Techniques Chevron down icon Chevron up icon
Section 2: Reconnaissance and Network Penetration Testing Chevron down icon Chevron up icon
Chapter 4: Reconnaissance and Footprinting Chevron down icon Chevron up icon
Chapter 5: Exploring Active Information Gathering Chevron down icon Chevron up icon
Chapter 6: Performing Vulnerability Assessments Chevron down icon Chevron up icon
Chapter 7: Understanding Network Penetration Testing Chevron down icon Chevron up icon
Chapter 8: Performing Network Penetration Testing Chevron down icon Chevron up icon
Section 3: Red Teaming Techniques Chevron down icon Chevron up icon
Chapter 9: Advanced Network Penetration Testing — Post Exploitation Chevron down icon Chevron up icon
Chapter 10: Working with Active Directory Attacks Chevron down icon Chevron up icon
Chapter 11: Advanced Active Directory Attacks Chevron down icon Chevron up icon
Chapter 12: Delving into Command and Control Tactics Chevron down icon Chevron up icon
Chapter 13: Advanced Wireless Penetration Testing Chevron down icon Chevron up icon
Section 4: Social Engineering and Web Application Attacks Chevron down icon Chevron up icon
Chapter 14: Performing Client-Side Attacks – Social Engineering Chevron down icon Chevron up icon
Chapter 15: Understanding Website Application Security Chevron down icon Chevron up icon
Chapter 16: Advanced Website Penetration Testing Chevron down icon Chevron up icon
Chapter 17: Best Practices for the Real World Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.1
(27 Ratings)
5 star 70.4%
4 star 0%
3 star 14.8%
2 star 0%
1 star 14.8%
Filter icon Filter
Top Reviews

Filter reviews by




Marek Zima Feb 13, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Feefo Verified review Feefo
Arwin Oct 18, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I am really happy with the book, and it was so cool that I didn't have to wait for days it. About book., I think it is a must have for everyone who wants to master the hacking skills.
Feefo Verified review Feefo
Elicio Hernández Aug 20, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excelente 👌
Amazon Verified review Amazon
Jim Brigham Oct 14, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If it wasn't for Mudge none of this would've happened
Amazon Verified review Amazon
Ian Jangai Mar 21, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you want to get an introduction into cyber security this book is what you need for the different type of testing an labs to guide you through your first experience.Highly recommend.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an audiobook? Chevron down icon Chevron up icon

Where there is an audiobook version of a title available, you can buy it from the book details for that title. Your audiobook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalized audiobook download file.

Clicking the link will download the audiobook in a ZIP file. Unzip the ZIP file to your desired location to access the audiobook’s .mp3 files. You may play these .mp3 files on any supported player or device of your choice.

Please Note: Packt audiobooks are non-returnable and non-refundable.

Packt audiobook and Licensing: When you buy an audiobook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it, we have tried to balance the need for the audiobook to be usable for you the listener with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your audiobook for your own use onto any machine
  • You may not pass copies of the audiobook on to anyone else

How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, audiobook, eBook, or Bundle (Print+eBook) please follow the below steps:

  1. Register on our website using your email address and password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Card, or PayPal)

Where can I access support around an audiobook? Chevron down icon Chevron up icon

  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us

What are the benefits of audiobooks? Chevron down icon Chevron up icon

  • You can get the information you need immediately
  • You can easily take them with you on a laptop or mobile device
  • You can download them an unlimited number of times
  • There is no password protection
  • They save resources and space
  • You can multitask while listening to audiobooks
  • What is an audiobook? Chevron down icon Chevron up icon

    An audiobook, also known as a talking book, is a recorded version of a book where the content is read aloud.