Web Penetration Testing with Kali Linux Paperback – Sep 25 2013
|New from||Used from|
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
Joseph Muniz is a technical solutions architect and security researcher. He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal network.
Joseph runs TheSecurityBlogger.com website, a popular resources regarding security and product implementation. You can also find Joseph speaking at live events as well as involved with other publications. Recent events include speaker for Social Media Deception at the 2013 ASIS International conference, speaker for Eliminate Network Blind Spots with Data Center Security webinar, speaker for Making Bring Your Own Device (BYOD) Work at the Government Solutions Forum, Washington DC, and an article on Compromising Passwords in PenTest Magazine - Backtrack Compendium, July 2013.
Outside of work, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.
Aamir Lakhani is a leading Cyber Security and Cyber Counterintelligence architect. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations.
Lakhani leads projects that implement security postures for Fortune 500 companies, the US Department of Defense, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter defense measures for defense and intelligence agencies, and has assisted organizations in defending themselves from active strike back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, and Advanced Persistent Threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books, and has appeared on National Public Radio as an expert on Cyber Security.
Writing under the pseudonym Dr. Chaos, Lakhani also operates the DrChaos.com blog. In their recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, infosec specialist, superhero..., and all around good guy."
What Other Items Do Customers Buy After Viewing This Item?
Most Helpful Customer Reviews on Amazon.com (beta)
A large portion of the content was padded with screenshots and step-by-step instructions on how to get the tools up and running. Most of the first half of the book covers pretty standard fare on what penetration testers do regardless of their focus, like recon, social engineering, and cracking passwords. Nothing I'd call Web-specific attacks. And at the end, an unexpectedly out of place diversion to file system forensics eats up a chapter as well. Doesn't do anything to help you with Web-based attacks, and is far too brief and summarized to help you with forensics.
I learned far more about the guts of Web application penetration testing; what the attack vectors are, how they work, what they look like, and which tools to use, from the OWASP Testing Guide.
This book respects a real pentest methodology used by pentesters.
Everything is clearly explained, step by step.
This book is my new arm for my next pentests :-)
Look for similar items by category
- Books > Computers & Technology > Networking & Cloud Computing > Network Administration > Linux & UNIX Administration
- Books > Computers & Technology > Operating Systems > Linux > Networking & System Administration
- Books > Computers & Technology > Operating Systems > Linux > Programming
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Quality Control
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Software Development
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Testing
- Books > Computers & Technology > Security & Encryption > Linux Security
- Books > Computers & Technology > Web Development > Programming > Linux Web