Deliver to Panama
IFor best experience Get the App
Full description not available
A**R
Absolutely not worth the price tag
The examples used in the book were extremely trivial and did not offer a lot of real insight into anything especially for the price tag. Save yourself the money and visit the OWASP site and their free documentation.
P**Y
Excellent Information
Great read. If you are new to either web penetration testing or kali linux, you'll learn a ton of very useful tools and techniques on how to determine hack-ability of a website. If you're not new to this, you'll be able to use this book as a great reference. YOu get tons of info and how-to's for each vulnerability. You get right to the nitty-gritty. The author attempt to help you get into the mind set of a person who would hack your site which helps to determine the various attack vectors. There were a few vectors mentioned that I did not think of, including some very useful shortcuts along the way. You could never really say this type of book is ever really "complete", but this is the most complete book I've read on the subject to date. Highly recommend it if you are on the fence.
H**O
This book is very worthwhile.
I liked this book because the author gives a good immersion on the theme, he introduces about the ecosystem of web applications, the needs of security, the structure, major flaws and the possible attackers. The steps to execute the penetration test are crucial and he presented the points that you need to carry on, exploring the flaws with the possible doors and the best tools. Security technology is an activity where you can never stop, you have to have caution and your team prepared to solve the flaws fast as possible.This book makes me understand what I need to do, what is more important, this subject is so dynamic that you never feel totally comfortable to deal with, but now I can see what an efficient pen test is like. So this book delivers what it promises and I would recommend for anyone who work or are interested on this topic, this book is very worthwhile.
R**N
Excellent book
This is a very thorough book. Plenty of examples of everything. Each idea and point is explained extremely well too. I could not be happier with this. It certainly has allowed me to expand my horizon in the security field.
N**)
High Appraisal on this good book on Web PenTest
This is very structural for both beginner and advanced forensic practitioners. There are detailed working steps to guide reader in applying Kali Linux in Penetration Test...Daniel
X**6
Needs to be written better
The author makes a good attempt at explaining the different tools. One will need to read this book though several times to be able to formulate a standardise plan. Upon rereading it, you find that some of these tools and modules do not even exist in a default Kali install nor is there any method in the book to acquire them. So this data is extremely important to include if you are going to talk about a particular module. Next, going from pages 82-84, there is a jump in context. We are reading about nmap and such one moment then all of a sudden we have jumped into the middle of another framework. Something has been edited out here. If I compare this book to other similar books that I am reading at the same time on this same subject, I would say, move on to another book instead. This one is simply trying to cover way too much with not enough effort. All they had to do was leave the book on the table a little long and develop it more.
Trustpilot
2 weeks ago
1 week ago