To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
L'impaginazione è terribile. La qualità del libro pecca in robustezza. I contenuti sono semplici da trovare online è una sorta di introduzione all'exploiting di macchine windows. Un commento ad un laboraorio di pentest insomma. Inutile se si cerca qualcosa di teorico.
La connaissance de metasploit, Windows,Linux est un must-have. Avec ce know-how, ce livre est une longue présentation d'outils et l'utilisation de qq fonctionnalités de ces derniers via la souris ou ligne de commande sans explication détaillée. Cela reste de fait très superficielle. Ou alors référence vers un lien internet. Peut-être que l'explication pour échapper au AV peut donner qq pistes... Il y a qq références à d'autres livres bien plus intéressants que celui-ci.
It always nice when a technical book is successful enough enough to warrant a follow up. However this one falls disappointingly short of the first.
Its poorly edited, and much less technically fluid or digestible.
The biggest issue i had was part of the 'intro' in which the author recommends using a ctf to familiarize yourself with certain concepts (over the wire). I love OTW and used that to help educate myself before making the leap to being an app sec professional. The way he explains one of the exercises reads terribly. I had done the games before reading his how-to, but if it had been the other way around, in no way would i have been able to complete even the most basic level. I found the answers thru command lines, not via the way more involved assembly/rev engineering method. It just seemed unnecessarily difficult.
While i like the larger print format and different information, none of it presented as clearly as the first nor was it as useful. The editing is also worse than the first volume.
I'd say skip this one. There are much better options in the market.
Poorly written. Heavy reliance on football analogy is more annoying than helpful. Does not progress through a logical sequence of learning through increasing difficulty. Feels more like a book about how hard it is to learn how to hack, so you should just pay the Author to hack for you. The book assumes too much technical skill to be useful to a beginner. The book tries to cover too many topics in a limited space to be a reference for an advanced hacker. Perhaps this book would be helpful as a tool for a mid-level hacker who is very familiar with a few techniques, and wants to get started with other attack vectors.
Never got past apt-get dist-upgrade. crash, after crash, on top of freeze after freeze. Tried on laptop and Desktop. Both PC's exceed specs required and I already use VM Workstation to RE malware. The issue was with Kali and updating the distribution packages. Absolutely maddening ! My friend who recommend this to me said he never got it work either, but still thought I would be interested because of my occupation. Also many links in the books that attempt to show you where to get things no longer work ex[...]among others. If you were hoping for more of an instruction manual than stay away from this. If you can't get any of the tools or systems to work, then the rest of the book is pretty useless.