Other Sellers on Amazon
+ S$6.84 delivery
Basic Security Testing With Kali Linux, Third Edition Paperback – 22 August 2018
|New from||Used from|
Enhance your purchase
Amazon International Store
Frequently bought together
- Language : English
- Paperback : 428 pages
- ISBN-10 : 1725031981
- ISBN-13 : 978-1725031982
- Customer reviews:
About the Author
Daniel W. Dieterle has worked in the IT field for over 20 years. For the last 8 years Daniel has worked in the security field as a consultant, security researcher and author. His articles have been published in international security magazines, and referenced by both technical entities and the media.
Daniel has written a total of 5 books based on Kali Linux. He has assisted with numerous security training classes and technical books mainly based on Ethical Hacking & Kali Linux. Daniel also enjoys helping out those new to the field by reviewing & editing security articles and technical papers.
No customer reviews
|5 star (0%)||0%|
|4 star (0%)||0%|
|3 star (0%)||0%|
|2 star (0%)||0%|
|1 star (0%)||0%|
Review this product
Most helpful customer reviews on Amazon.com
A far better measure is the Kali documentation, which deserves four or five stars. The documentation does not tell the user how to use the Kali tools, and that's what I was looking for in this book.
The preview allows one to look at the contents list, and that gives the impression that the book covered my needs. It does not.
Chapter 24 Wireless Network Attacks provides a good example: in the section covering Routersploit, the author explains that it "functions just like Metasploit" in the expectation that the reader has already covered that section. This is not a novel that one reads sequentially. If you have not read that section yet, tough.
In the section covering airport-ng, the author tells you how to run the test. But after running the test, you'll discover that you are unable to connect to the internet. The book does not spell that out, and more importantly does not tell you how to get your network adapter up and running again. The simplest way is to restart the system, but there are alternatives that work, and a decent book should offer both alternatives, instead of leaving you wondering what just happened.
The coverage explaining using the tools is superficial. Finding out how to use Wireshark is easier by doing a search on the Internet than using this book. In what amounts to an admission, the author recommends that if the reader wants more information on using Kali's wireless tools they should buy "Kali Linux Penetration Testing Beginner's Guide".
In chapter 4, Reconnaissance with Recon-NG, the author mentions Maltego as being a very popular tool and refuses to explain how to use it, because "it already has a lot of coverage". Really? There are good reasons for not wanting to use Maltego. Before using it, the user must register. Maltego requires plenty of memory. But the author does not say that.
Then the instructions of how to use Recon-NG are wrong. Again, searching the Internet offers superior solutions.
Don't wast your money. If I'd wanted to search the Internet, I would not have bought this book.