Kali Linux Cookbook: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark 3rd ed. Edition

★★★★★ 4.9 92 reviews

$35.99
Price when purchased online
Free shipping Free 30-day returns

Sold and shipped by coachtoriocuritiba.com.br
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here.
$35.99
Price when purchased online
Free shipping Free 30-day returns

How do you want your item?
You get 30 days free! Choose a plan at checkout.
Shipping
Arrives May 8
Free
Pickup
Check nearby
Delivery
Not available

Sold and shipped by coachtoriocuritiba.com.br
Free 30-day returns Details

Product details

Management number 219220286 Release Date 2026/05/03 List Price $14.40 Model Number 219220286
Category

Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniquesFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesInstall and configure Kali Linux on multiple platforms, choosing the best desktop and use casePerform expert network scanning and vulnerability analysis with Nmap, OpenVAS, and NessusAugment social engineering campaigns with AI chatbots for real-time, personalized engagementPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis hands-on guide will help you become a penetration testing expert by gaining command of the powerful tools of Kali Linux, the industry-leading Linux distribution designed for ethical hacking and security auditing, and applying them in real-world security assessments.This cookbook’s third edition is updated to include the latest advancements in cybersecurity. The author leverages their 20 years of industry experience to guide you through installing Kali on multiple platforms, setting up lab environments, and using modern tools, such as Nmap, Metasploit, Wireshark, OpenVAS, and AI-driven reconnaissance. You’ll also explore automated social engineering, wireless hacking, web and database exploitation, and advanced persistence techniques, delivering a comprehensive and up-to-date penetration testing resource. Recognizing the critical role of human factors in security, this edition expands on social engineering tactics, including psychological principles and AI-driven automation, to craft highly effective attack campaigns.By the end of this book, you’ll have strengthened your grasp of the entire penetration testing process, from environment setup and reconnaissance to vulnerability analysis, exploitation, and maintaining access, and be equipped with industry-standard tools to enhance your effectiveness as a security professional.What you will learnFind out how to scan the network to find vulnerable computers and serversUse AI-enhanced tools for thorough reconnaissance and intelligenceIdentify and exploit vulnerabilities with advanced penetration toolsApply social engineering tactics and advanced password crackingPerform wireless, web, and database penetration testing techniquesMaintain persistent access while avoiding detection and defensesWho this book is forThis book is ideal for cybersecurity professionals, ethical hackers, penetration testers, red teamers, security analysts, and IT administrators looking to strengthen their offensive security skills using Kali Linux. It is also for students, career-switchers, and aspiring ethical hackers preparing for roles in cybersecurity operations and threat analysis. A basic understanding of networking, operating systems, and security fundamentals is recommended.Table of ContentsBootstrapping Your Cyber ArsenalCloak and Dagger: Stealth and AnonymityDeep Recon: Unveiling the Digital LandscapeNmap Mastery – Scanning with PrecisionWireshark Wizard: Network Traffic DemystifiedWeaknesses Exposed: Advanced Vulnerability AnalysisExploitation Unleashed: Finding the Hidden FlawsHuman Hacking: The Art of Social EngineeringBreaking Barriers: the Secrets of Password CrackingClimbing the Ladder: Mastering Privilege EscalationWireless Warfare: Dominating the AirwavesWeb Warriors: Exploiting Online and Database VulnerabilitiesPersistence Pays: Securing Long-Term Access*Email sign-up and proof of purchase required Read more

ISBN10 1835889816
ISBN13 978-1835889800
Edition 3rd ed.
Language English
Publisher Packt Publishing
Dimensions 7.5 x 1.28 x 9.25 inches
Item Weight 2.12 pounds
Print length 568 pages
Publication date November 28, 2025

Correction of product information

If you notice any omissions or errors in the product information on this page, please use the correction request form below.

Correction Request Form

Customer ratings & reviews

4.9 out of 5
★★★★★
92 ratings | 38 reviews
How item rating is calculated
View all reviews
5 stars
89% (82)
4 stars
1% (1)
3 stars
0% (0)
2 stars
0% (0)
1 star
10% (9)
Sort by

There are currently no written reviews for this product.