LiveZilla Live Chat Software
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Networking & Cloud Computing > Network Security > 1783982144
  1. Kali Linux Network Scanning Cookbook
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Kali Linux Network Scanning Cookbook

    Delivery: 10-20 Working Days
    Customer Ratings (12 reviews)
    Price R910.00

Additional Information

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali Linux testing platform
  • A step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own

Who This Book Is For

"Kali Linux Network Scanning Cookbook" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience.

What You Will Learn

  • Develop a network-testing environment that can be used to test scanning tools and techniques
  • Understand the underlying principles of network scanning technologies by building custom scripts and tools
  • Perform comprehensive scans to identify listening on TCP and UDP sockets
  • Examine remote services to identify type of service, vendor, and version
  • Evaluate denial of service threats and develop an understanding of how common denial of service attacks are performed
  • Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them

In Detail

Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. This immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them.

Similar Products

Kali Linux: Wireless Penetration Testing Beginner's GuideBasic Security Testing with Kali Linux 2The Hacker Playbook 2: Practical Guide To Penetration TestingBlue Team Field Manual (BTFM) (RTFM)Intermediate Security Testing with Kali Linux 2Hash Crack: Password Cracking ManualMetasploit: The Penetration Tester's GuideRtfm: Red Team Field ManualKali Linux 2: Windows Penetration TestingMastering Kali Linux for Advanced Penetration Testing

Justin Hutchens
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
black & white illustrations
black & white illustrations
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
Most Helpful Customer Reviews

Chapter 1: Getting Started
Good detailed coverage of setting up VMWare Player (Windows) or VMWare Fusion (Mac OS X). I would have seen the author at least cover VirtualBox as it works on Windows, OS X and Linux.

The discussion on having vulnerable targets to work with covers Metasploitable which is an excellent choice. I am glad the point was stressed to not expose a Metasploitable system to any untrusted network. While I appreciate learning on Windows XP I would have expected a cook book to focus on either the latest Windows OS (8.1) or the most used Windows OS (Windows 7).

Chapter 2: Discovery
For some IT professionals the review of the OSI model is potentially redundant, but for many it is essential to truly understand the process of scanning a network. The discussion on layer 2 vs layer 3 vs layer 4 discovery was very clear and effective.

I like the depth given for each of the chosen tools (Scapy, ARPing, Nmap, NetDiscover, Metasploit,... Read more
Kali Linux Network Scanning Cookbook

Where to begin with this book, well we can start by just how amazing it is! Right off the start you setup a virtual environment and the instructions are pretty clear, I had no issues getting this going. The Windows XP system I didn't even bother with as I wanted to focus on ISO images of systems I had on hand and that worked perfectly for me. Setting up SSH access was pretty simple, and despite mentioning SCP for secure file transfers it would have been nice to have an example; however fear not you can always use man. On the up side it was nice to see both coverage for VIM and Nano which are standard on all Linux distributions I'm aware of.

This book isn't the standard pentesting book that I've found, it actually goes over some of the foundation behind the different layers of the network protocols and how everything integrates and works in harmony, and how using this information you'll know what to look for. Service... Read more
All that you ever wanted to know about scanning networks and then some! This is one of the most complete step-by-step scanning guides that I have seen. The book starts out with the very basics of network scanning and progresses through stages to more advanced scans and even exploitation.

All the basics are present, like using Nmap, ARPing, Scapy and other tools to perform varied levels of discovery, port scanning and fingerprinting. You are then masterfully shown how to greatly expand the capabilities and functions of these tools by using scripting.

But it doesn't stop there, you then move on to using scanning tools and Burp Suite to perform Denial of Service attacks, SQL injection and Metasploit attacks. Because really what is a scanning book without including offensive attacks?

A great learning tool for new readers, and an exceptional reference guide for veterans. I highly recommend this book!
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Animals, Batteries, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.