کالی لینوکس یک پلتفرم تست نفوذ قدرتمند و محبوب در جهان است که توسط متخصصان امنیتی در طیف گسترده ای از تخصص ها از جمله آزمایش نفوذ، مهندسی معکوس و ارزیابی آسیب پذیری استفاده می شود. کالی لینوکس اکنون یک چارچوب تست نفوذ کامل است و از ویژگی های دبیان گنو / لینوکس و جامعه آزاد بهره می برد. مخاطب این سیستم عامل متخصصان امنیتی و علاقه مندان حوزه سایبری هستند.
سرفصل های کتاب:
1. About Kali Linux
2. Getting Started with Kali Linux
3. Linux Fundamentals
4. Installing Kali Linux
5. Configuring Kali Linux
6. Helping Yourself and Getting Help
7. Securing and Monitoring Kali Linux
8. Debian Package Management
9. Advanced Usage
10. Kali Linux in the Enterprise
11. Introduction to Security Assessments
12. Conclusion The Road Ahead
Kali Linux is the world’s most powerful and popular penetration testing platform, used by security professionals in a wide range of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment. It is the culmination of years of refinement and the result of a continuous evolution of the platform, from WHoppiX to WHAX, to BackTrack, and now to a complete penetration testing framework leveraging many features of Debian GNU/Linux and the vibrant open source community worldwide.
Kali Linux has not been built to be a simple collection of tools, but rather a flexible framework that professional penetration testers, security enthusiasts, students, and amateurs can customize to fit their specific needs.
More about the author
Acknowledgments of Raphaël Hertzog: I would like to thank Mati Aharoni: in 2012, he got in touch with me because I was one out of dozens of Debian consultants and he wanted to build a successor to BackTrack that would be based on Debian. That is how I started to work on Kali Linux, and ever since I have enjoyed my journey in the Kali world.
Over the years, Kali Linux got closer to Debian GNU/Linux, notably with the switch to Kali Rolling, based on Debian Testing. Now most of my work, be it on Kali or on Debian, provides benefits to the entire Debian ecosystem. And this is exactly what keeps me so motivated to continue, day after day, month after month, year after year.
Working on this book is also a great opportunity that Mati offered me. It is not the same kind of work but it is equally rewarding to be able to help people and share with them my expertise of the Debian/Kali operating system. Building on my experience with the Debian Administrator’s Handbook, I hope that my explanations will help you to get started in the fast-moving world of computer security.
I would also like to thank all the Offensive Security persons who were involved in the book: Jim O’Gorman (co-author of some chapters), Devon Kearns (reviewer), Ron Henry (technical editor), Joe Steinbach and Tony Cruse (project managers). And thank you to Johnny Long who joined to write the preface but ended up reviewing the whole book.
Acknowledgments of Jim O’Gorman: I would like to thank everyone involved in this project for their contributions, of which mine were only a small part. This book, much like Kali Linux itself was a collaborative project of many hands making light work. Special thanks to Raphaël, Devon, Mati, Johnny, and Ron for taking on the lion’s share of the effort. Without them, this book would not have come together.
Acknowledgments of Mati Aharoni: It has been a few years since Kali Linux was first released, and since day one, I have always dreamt of publishing an official book which covers the Kali operating system as a whole. It is therefore a great privilege for me to finally see such a book making it out to the public. I would like to sincerely thank everyone involved in the creation of this project—including Jim, Devon, Johnny, and Ron. A very special thanks goes to Raphaël for doing most of the heavy lifting in this book, and bringing in his extensive expertise to our group.