Penetration Testing: A Hands-On Introduction to Hacking

( 2 )

Overview

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run ...

See more details below
Paperback
$30.94
BN.com price
(Save 38%)$49.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (14) from $28.22   
  • New (12) from $28.22   
  • Used (2) from $30.33   
Penetration Testing: A Hands-On Introduction to Hacking

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$28.49
BN.com price
(Save 42%)$49.95 List Price

Overview

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Learn how to:

  • Crack passwords and wireless network keys with brute-forcing and wordlists
  • Test web applications for vulnerabilities
  • Use the Metasploit Framework to launch exploits and write your own Metasploit modules
  • Automate social-engineering attacks
  • Bypass antivirus software
  • Turn access to one machine into total control of the enterprise in the post exploitation phase

You'll even explore writing your own exploits. Then it's on to mobile hacking - Weidman's particular area of research - with her tool, the Smartphone Pentest Framework.

With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Read More Show Less

Product Details

  • ISBN-13: 9781593275648
  • Publisher: No Starch Press San Francisco, CA
  • Publication date: 5/25/2014
  • Edition number: 1
  • Pages: 528
  • Sales rank: 174561
  • Product dimensions: 7.00 (w) x 9.00 (h) x 1.20 (d)

Meet the Author

Georgia Weidman is a penetration tester, researcher, and the founder of Bulb Security, a security consulting firm. She has presented at conferences around the world, including BlackHat, Shmoocon, and Derbycon, and teaches classes on topics like penetration testing, mobile hacking, and exploit development. In 2012, she was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.

Read More Show Less

Table of Contents

About the Author

Foreword

Acknowledgments

Introduction

Penetration Testing Primer

The Basics

Chapter 1: Setting Up Your Virtual Lab

Chapter 2: Using Kali Linux

Chapter 3: Programming

Chapter 4: Using the Metasploit Framework

Assessments

Chapter 5: Information Gathering

Chapter 6: Finding Vulnerabilities

Chapter 7: Capturing Traffic

Attacks

Chapter 8: Exploitation

Chapter 9: Password Attacks

Chapter 10: Client-Side Exploitation

Chapter 11: Social Engineering

Chapter 12: Bypassing Antivirus Applications

Chapter 13: Post Exploitation

Chapter 14: Web Application Testing

Chapter 15: Wireless Attacks

Exploit Development

Chapter 16: A Stack-Based Buffer Overflow in Linux

Chapter 17: A Stack-Based Buffer Overflow in Windows

Chapter 18: Structured Exception Handler Overwrites

Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules

Mobile Hacking

Chapter 20: Using the Smartphone Pentest Framework

Resources

Downloading the Software to Build Your Virtual Lab

Read More Show Less

Customer Reviews

Average Rating 3
( 2 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(1)
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted Sun Aug 10 00:00:00 EDT 2014

    Great book for beginners.  Lots of good instructions for setting

    Great book for beginners.  Lots of good instructions for setting up your own lab so you can work through the book's exercises.  Lots of screen shots to make sure you are on the right track. Author does a great job of explaining things giving you enough of the background and theory without going overboard.  I highly recommend the book. It is not only fun to work through but also fun to read the author's experience in the field.  If you ever thought hacking would be fun, this book teaches you how to get started .
    I didn't preorder the book but I did receive the book from Barnes and Noble in a timely manner.  Maybe the book publisher underestimated the book's popularity and failed to print enough books.  Maybe it is not Barnes and Nobles fault but the publishers.  

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted Tue May 27 00:00:00 EDT 2014

    Poor rating not for content or author but because Barnes and Nob

    Poor rating not for content or author but because Barnes and Noble took pre-orders, failed to deliver in time frame, and now can't even place order on website. Makes me think something fishy is going on. To cancel the order it would be 30 days before getting refund? Find the book elsewhere my suggestion would be perhaps their competition Amazon.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)