BackTrack 5 Cookbook

( 1 )

Overview

The BackTrack 5 Cookbook is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes....

See more details below
Paperback
$43.29
BN.com price
(Save 3%)$44.99 List Price
Other sellers (Paperback)
  • All (5) from $43.53   
  • New (4) from $47.08   
  • Used (1) from $43.53   
BackTrack 5 Cookbook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$26.99
BN.com price

Overview

The BackTrack 5 Cookbook is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. BackTrack 5 Cookbook will serve as an excellent source of information for the security professional and novice alike.

BackTrack 5 Cookbook provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Read More Show Less

Product Details

  • ISBN-13: 9781849517386
  • Publisher: Packt Publishing
  • Publication date: 7/20/2012
  • Pages: 296
  • Product dimensions: 7.50 (w) x 9.25 (h) x 0.62 (d)

Meet the Author

Willie Pritchett has been an IT professional for over 20 years. He currently is an entrepreneur and owner of Mega Input Data Services, Inc.; a full service database management, network security, and staffing firm located in Indianapolis, Indiana. He has developed several security applications. Willie is also a seasoned Windows/Linux security professional and Certified Ethical Hacker.

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted February 3, 2013

    more from this reviewer

    BackTrack 5 seems best suited for a very experienced linux or un

    BackTrack 5 seems best suited for a very experienced linux or unix user. One who also has sysadmin background. You get an indication of this by the second chapter. It commences by explaining how to get and use kernel headers in compiling code. The kernel headers are the source code of the linux kernel itself. Another indicator is the next topic, about installing Broadcom wireless drivers. It turns out these days that a lot of computer breakins happen via wireless networks.

    The book educates you on a potentially useful tool - Maltego, for threat assessment. But perhaps more apropos is the discussion on how to use Nessus. This is a common and powerful tool for finding vulnerabilities. The Nessus screen captures give you some appreciation of the many options available within it. It is ecumenical. It can detect flaws in Microsoft and linux systems and the text explains both cases.

    A variant of Nessus is also explored - OpenVAS. It has the advantage of being free, unlike Nessus which charges for professional use.

    Chapter 5 may be problematic to some users. It describes how to exploit vulnerabilities. Other sections of the book are about finding these. But the intellectual defence of chapter 5 is that a sysadmin can get to appreciate how a black hat might come into her system, thus giving incentive for the sysadmin to patch flaws. Even so, be careful when or if you apply this chapter. This can be like running the password breaker Crack. In some companies, doing the latter in an unauthorised way is grounds for dismissal. Likewise if using the exploitations in chapter 5, especially against a system that is not your company's.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)