• Hacking with Kali Linux: Penetration Testing Hacking Bible

  • By: Alex Wagner
  • Narrated by: Jack Bellows
  • Length: 4 hrs and 22 mins
  • 4.9 out of 5 stars (13 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured.

This audiobook will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.

If you attempt to use any of the tools discussed in this audiobook on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all listeners to deploy any tool described in this audiobook for White Hat use only.

The focus of this audiobook will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every section you will find demonstrated examples step-by-step.

Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand.

There are many step-by-step deployment guides on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.

Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker.

Buy this audiobook now and get started today!

In this audiobook you will learn:

  • How to Install Kali Linux and TOR
  • How to use BurpSuite for various attacks
  • SSL and CMS Scanning Techniques
  • Port Scanning and Network Sniffing
  • How to Configure SPAN
  • How to implement SYN Scan Attack
  • How to Brute Force with Hydra
  • How to use Low Orbit ion Cannon
  • How to use Netcat, Meterpreter, Armitage, SET
  • How to deploy Spear Phishing and PowerShell Attack
  • How to deploy various Wireless Hacking Attacks
  • How to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and many more Kali Linux hacking tools...

Buy this audiobook now and get started today!

©2019 Alex Wagner (P)2020 Alex Wagner

What listeners say about Hacking with Kali Linux: Penetration Testing Hacking Bible

Average Customer Ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    12
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    9
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    8
  • 4 Stars
    1
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Outstanding!

Very well read, extremely well presented. I had my doubts. I was wrong. I expected that the only way to gain benefit from this book was by way of a physical book. I was wrong. If you get your hands on this audio book, grab it.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Most of the basics and general knowledge

This audiobook was full of informative information and it was very easy to listen and understand. This audiobook provides clarifications about hacking with Kali Linux and by listening this audiobook I am able to know the process of Hacking works. This book is most of the basics and general knowledge.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Clear concepts and straightforward audiobook

This audiobook helped me a lot as it taught me everything i needed to know regarding Linux. This book is perfect for the beginner learning Ethical Hacking and Cyber security.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great audio book

By this audiobook you can learn about the Kali Linux installation and how to customize Kali Linux. Author also include examples on how to hack using Kali Linux and how to plan an attack. Great audiobook and full of practical advice.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Deryck Jones
  • Deryck Jones
  • 12-22-20

A really good introduction to Kali Linux

HACKING WITH KALI LINUX: Penetration Testing Hacking Bible is a good and fairly thorough, high level introduction to Kali Linux. Alex Wagner is a UK based, Network and Security Engineer who has produced a number of Cyber Security / Hacking manuals. The book is well written with well organised, highly readable technical content, making it suitable for less technical readers.

HACKING WITH KALI LINUX: Penetration Testing Hacking Bible starts with some very clear to follow basics on Kali, it's installation and updating and on setting up TOR to hide any actions undertaken. The guide continues through the stages of penetration testing giving a synopsis of a selection of Kali's tools that can be used at each stage. This includes brief coverage of Airmon-ng, Airodump-ng, Burp Suite, Deepmagic Dirbuster, Discoverscripts, Dnsrecon, Ettercap, Fierce, H-ping_3, Harvester, Httrack, Hydra, Lbd, Low Orbit IO Cannon, Metagoofill, Metasploit, Meterpreter, Netcat, Nmap, Openvas, Parasite6, Recon-ng, RKH, Scapy, Searchsploit, SET, Smbexec, Sqlmap, Sslscan, Wafw00f, Webslayer, Weevely, Wireshark, Wpscan, Xplico, Zaproxy. It also includes a chapter to cover Armitage, the GUI front-end for Metasploit.

There are few areas in the book which I would not necessarily have included. Even though the book was published in 2019, there is a chapter on WEP Attacks, takes up over 6 minutes of content and whilst this introduces some of the wireless tools, these are then covered again in the Additional Wireless Attacks chapter. A number of chapters were present which covered Burp Suite however these relied on the use of a commercial feature which are not present in Kali Linux. Parasite6 was introduced in chapter 36 to briefly the issue of ARP Spoofing in IPv6. I found quite a few interesting tips in the book, such as Turnkey Linux, a virtual appliance library which provides ready to use solutions for open source software.
 
I enjoyed reading the guide and even though it was all fairly high level, I did learn quite a lot from it. It is a really good introduction to Kali Linux and I am interested in reading some of the author’s other guides.