Jump to ratings and reviews
Rate this book

Hacking with Kali: Practical Penetration Testing Techniques

Rate this book
"HackingwithKali" introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of theKali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of theKali live distribution. You ll learn how to configure networking components, storage devices and system services such as DHCP and web services.Once you're familiar with the basic components of the software, you'll learn how to use Kalithrough the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security. Provides detailed explanations of the complete penetration testing lifecycleComplete linkage of the Kali information, resources and distribution downloadsHands-on exercises reinforce topics

160 pages, Paperback

First published January 1, 2013

5 people are currently reading
69 people want to read

About the author

James Broad

7 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (20%)
4 stars
10 (41%)
3 stars
9 (37%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
1 review
April 16, 2020
In this review I examine, Andrew Bindner, James Broad's book, Hacking with Kali: Practical Penetration Testing Techniques.

James Broad is the president and owner of LLC. Also, both in military and academic terms, he has many experiences in this field and received many awards and he explains his experiences by writing a book. Andrew Bindner lives as a senior security consultant at CDW.

This book may be a good option especially for people who are at the beginning stage. To understand the book, simple computer knowledge and simple english knowledge will suffice. For experienced people, the content may remain simple.

The main theme of the book is to reflect the practical penetration test techniques with the Kali Linux operating system to the readers at a simple level.

When we come to the content part of the book, we can say that there is no content in the book. The author did not choose to create a section called the contents, but instead of this he tried to summarize the content of the book and what it would do next and the general purpose of the book, in the introduction. Apart from that, he also collected terms and concepts under the title of the index at the end of the book and tried to present the page ranges that the reader could reach to those topics or terms within the book.

In the book, visualization method is used, but we can say that it can be increased in some sections while some is sufficient and understandable.
In addition, in the introduction part of the book, the author aimed to make an introduction to the book by talking about who this book is for, what topics the book contains, the terms in the book, the concept of ethical hacking and the terms that follow, the operating system and history it will use.

With the summaries he wrote at the end of each chapter, the author once again touched upon the places he deemed important and believed to be learned and should be considered.
When we come to the end of the book, the reference part that we are used to seeing from other books is given briefly at the end of some chapters in this book. In the last part of the book, the author presented a complete list of Kali Penetration Tools to his reader, offering them a wide range of tools.

When we look at the way the subjects are handled, the author started with the installation of the operating system that he will use for future applications, by supporting his narration with pictures, he has increased clarity and tried to prepare an understandable environment for his reader with a very clear expression. Later, while installing the applications and packages to be used in this operating system, he also touched on terminal usage and terminal codes and aimed to teach the user both how to set up the necessary training and how to do all this, and use terminal commands. By completing the configuration of the operating system it has installed, it has made the operating system suitable for penetration tests.

When we come to the more term concepts and subjects and the points that the book wants to tell and teach its readers, the vulnerable metasploitable2 has installed the machine and provided how to install it with a clear and understandable language and supporting it with pictures. Then he mention about the life cycle of a penetration test, and talked about how this cycle should be with reconnaissance, scanning, exploitation, maintaining access and reporting.

The author, by studying each element of this cycle in the book one by one, has studied and explained these chapters simply in his book by mentioning what should be learned in each cycle and what should be known. For example, in order to scan a network, he first mention about the concept of the network, touched on the TCP / IP concepts, mentioned what the network is, and then mention about the protocols and how to find open ports on how to overcome the defenses in these protocols and mentioned about the tools that should be used here. After processing all the elements of the life cycle, he ended the author's book with the reporting section.

Combining all of these, while the author aims to provide us with information about the life cycle of penetration tests in a simple way, the examples and narration of this cycle will be suitable for a beginner. The fact that the book does not have a complicated language will also be a plus at this point. In this sense, this book can be considered as an excellent introduction book for those interested in this field.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.