Kali Linux Cookbook - Third Edition: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark
商品資訊
ISBN13:9781835889800
出版社:PACKT PUB
作者:Corey P. Schultz
出版日:2025/11/28
裝訂:平裝
規格:23.5cm*19.1cm*2.9cm (高/寬/厚)
版次:3
商品簡介
Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniques
DRM-free PDF version + access to Packt's next-gen Reader*
Key Features:
- Install and configure Kali Linux on multiple platforms, choosing the best desktop and use case
- Perform expert network scanning and vulnerability analysis with Nmap, OpenVAS, and Nessus
- Augment social engineering campaigns with AI chatbots for real-time, personalized engagement
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description:
This hands-on guide will help you become a penetration testing expert by gaining command of the powerful tools of Kali Linux, from versions 2024.3 through 2025.1, aligned with the latest features introduced and applying them in real-world security assessments.
This cookbook's third edition is updated to include the latest advancements in cybersecurity. The author leverages their 20 years of industry experience to guide you through installing Kali on multiple platforms, setting up lab environments, and using modern tools, such as Nmap, Metasploit, Wireshark, OpenVAS, and AI-driven reconnaissance. You'll also explore automated social engineering, wireless hacking, web and database exploitation, and advanced persistence techniques, delivering a comprehensive and up-to-date penetration testing resource. Recognizing the critical role of human factors in security, this edition expands on social engineering tactics, including psychological principles and AI-driven automation, to craft highly effective attack campaigns.
By the end of this book, you'll have strengthened your grasp of the entire penetration testing process, from environment setup and reconnaissance to vulnerability analysis, exploitation, and maintaining access, and be equipped with industry-standard tools to enhance your effectiveness as a security professional.
*Email sign-up and proof of purchase required
What You Will Learn:
- Find out how to scan the network to find vulnerable computers and servers
- Use AI-enhanced tools for thorough reconnaissance and intelligence
- Identify and exploit vulnerabilities with advanced penetration tools
- Apply social engineering tactics and advanced password cracking
- Perform wireless, web, and database penetration testing techniques
- Maintain persistent access while avoiding detection and defenses
Who this book is for:
This book is ideal for cybersecurity professionals, ethical hackers, penetration testers, red teamers, security analysts, and IT administrators looking to strengthen their offensive security skills using Kali Linux. It is also for students, career-switchers, and aspiring ethical hackers preparing for roles in cybersecurity operations and threat analysis. A basic understanding of networking, operating systems, and security fundamentals is recommended.
Table of Contents
- Bootstrapping Your Cyber Arsenal
- Cloak and Dagger: Stealth and Anonymity
- Deep Recon: Unveiling the Digital Landscape
- Nmap Mastery: Scanning with Precision
- Wireshark Wizard: Network Traffic Demystified
- Weakness Exposed: Advanced Vulnerability Analysis
- Exploitation Unleashed: Finding the Hidden Flaws
- Human Hacking: The Art of Social Engineering
- Breaking Barriers: The Secrets of Password Cracking
- Climbing the Ladder: Mastering Privilege Escalation
- Wireless Warfare: Dominating the Airwaves
- Web Warriors: Exploiting Online and Database Vulnerabilities
- Persistence Pays: Securing Long-Term Access
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

