New Book Overview: “Basic Security Testing with Kali Linux, 3rd Edition”

My newest book, a cover to cover update of my Basic Kali book is now available! After numerous requests for an update, the new “Basic Security Testing with Kali Linux, 3rd Edition” is here!

What was intended to be a quick version change update, turned into a 6-month overhaul. It is amazing how much can change in the security world in 2 years. All chapters have been revamped, with a lot of new material added. The latest book is also 50 pages longer than the previous version!

What’s New:

  • The entire book was updated to Kali Linux 2018
  • All tools & tutorials updated
  • Obsolete tools removed
  • Many new tools added
  • Password Cracking section expanded
  • Kali on RPi chapter totally revamped
  • Kali NetHunter chapter added

Table of Contents List:

I was going to use Metasploitable3 for the Windows target in this book, but with the install complexity (and install issues) of Ms3, I decided to stay with Windows 7. I also occasionally use Windows 10 as a test target and Server 2016 is mentioned a few times as well. I will most likely use Ms3 for the upcoming advanced book. Metasploitable2 is still used for some of the Linux tutorials, as it is very easy for new users to use and follow.

The Basic Kali book is used by Universities, Training Centers, and in Ethical Hacking classes worldwide. It is also used as a training aid for multiple US Government Agencies. I have also been told numerous times that my Kali series is excellent prep material for the OSCP certification. The book is now in its third revision, with major changes made from user feedback and requests.

I have been completely shocked and humbled by the popularity of a book that was originally written as an extension of my blog posts and has evolved into a worldwide basic training guide for the exceptional Kali Linux ethical hacking platform. This continuing project would have never been possible without the flood of support and feedback from the infosec community. I am very excited to present this new version to the community and look forward to hearing your feedback and comments.

Check it out on Amazon.com.

Thank you so much for your continued support!

Hacking the Holidays – Security Gift Ideas

Hacking the Holidays hd

It’s that time of the year again when people wonder, “What should I get for the hacker in my life?” So, I thought I would give out a few helpful hints, and throw in some shameless advertising to boot!

Books

Always a great choice, books are very important for the security enthusiast. Not only do they increase our skillset, but also make great places to put your mug, adjust monitor heights, or block a door open.

book marketing

Recommended Security Books:

Hardware

Most hackers love to tinker with hardware. Here are some toys that can be used by the naughty (Red Teamers 😉 ) and the nice.

Raspi Zero Banner

Hardware hacking tools are always a hit. Hak5 and Hacker Arsenal have some great products. Raspberry Pi kits are always fun to tinker with, and you can use them for so many different things. Check out dantheiotman.com for some ideas.

Other Ideas

  • Gift Cards (Amazon, Steam, Playstation, etc – ask to find out what they use)
  • Video Game related swag (Bethesda store is great!)
  • Sci Fi stuff
  • Desk Toys (Who wouldn’t like a Bluetooth toy to try to hack?)
  • Hoodies (stereotypical, I know, but many do like them!)

Sci Fi and video game related posters, shirts, etc. can be a hit. If all else fails, Gift cards are always a good choice if you still can’t decide what the hacker in your life would like.

I hope this helps. Here’s wishing you and yours a Happy Holidays, Merry Christmas, and a wonderful and prosperous New Year!

Hacking the Holidays! Computer Security Book Gift Ideas

Santa Hacker 2

Got a computer security guru on your shopping list and don’t know what to get them? Or tired of getting socks and sweaters for Christmas and want something you can really use? We have put together a list of some of the best selling security books for 2014!

Check out these excellent computer security books:

 

Basic Security Testing Kali LinuxBasic Security Testing with Kali Linux

Great book for those new to the security field or seasoned expert looking for a reference guide. Learn computer security testing with easy to follow, step-by-step tutorials using Kali Linux. In-depth sections on Metasploit,  Exploiting Windows and Linux Systems, Wi-Fi security testing, Social Engineering attacks and much more. If you are looking for a security book to get you started in the field, this is it!

 

Red Team Field Manual 1RTFM: Red Team Field Manual

A no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.

 

 

Black Hat PythonBlack Hat Python: Python Programming for Hackers and Pentesters

A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz’s Black Hat Python explores the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more.

 

 

Art of Memory ForensicsThe Art of Memory Forensics

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. Experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields.

 

Hacker PlaybookThe Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice.

 

Looking for more ideas?

We hope you enjoyed the list, have a great Holiday season!