2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale
2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale__front
2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale__left

Description

Product Description

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Learn how to:
–Crack passwords and wireless network keys with brute-forcing and wordlists
–Test web applications for vulnerabilities
–Use the Metasploit Framework to launch exploits and write your own Metasploit modules
–Automate social-engineering attacks
–Bypass antivirus software
–Turn access to one machine into total control of the enterprise in the post exploitation phase

You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.

With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Review

"This is one of the top books you must read if you are new to penetration testing . . . Not only is the book still relevant to the community, new courses are being created that center around this book. Including a new one taught by Georgia herself! And although Georgia is currently working on a new version, this book is still a must have in any hacker’s collection."
—Davin Jackson, Alpha Cyber Security, Books to Start Your Penetration Testing Journey

"Penetration Testing: A Hands-on Introduction to Hacking, by Ms. Georgia Weidman, is one of the best book for to start with and for advancing the career in the field of penetration testing. I personally suggest the learners to start with this as the use of words are very simple which makes learning easy, also the methods are well explained for novice to grasp."
—Kamal Dev, KamalDev.me

About the Author

Georgia Weidman is a penetration tester and researcher, as well as the founder of Bulb Security, a security consulting firm. She presents at conferences around the world, including Black Hat, ShmooCon, and DerbyCon, and teaches classes on topics such as penetration testing, mobile hacking, and exploit development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.

Product information

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Videos

Help others learn more about this product by uploading a video!
Upload video
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

More items to explore

Customer reviews

4.6 out of 54.6 out of 5
459 global ratings

Reviews with images

Top reviews from the United States

Felscream
5.0 out of 5 starsVerified Purchase
From someone with 8 years of IT Security, now Cybersecurity.
Reviewed in the United States on November 27, 2018
Where to begin with this book. I had been looking for a book on Kali Linux for over a year now. Many were too deeply set in theory or history and the other half was highly advanced. While I have made a career in cybersecurity, pentesting was something I knew nothing... See more
Where to begin with this book. I had been looking for a book on Kali Linux for over a year now. Many were too deeply set in theory or history and the other half was highly advanced. While I have made a career in cybersecurity, pentesting was something I knew nothing about from a practical standpoint. When I saw this book was by No Starch Press and was full of essential topics (based on table of contents) I did not hesitate to make the purchase.

I just finished the book and here is my feedback. Yes some of the .iso files for the target environments are harder to find but can still be found online without the use of torrents. If this stops you from doing the labs then this is purely an academic endeavor and you will not have the skills (resourcefulness) to become a pentester. To me it added to the challenge. I also read in some reviews that the hosted files from the author are no longer available and while this is true, you can still get all the information you need to set up you lab from exploit-db and other sites.

Overall this book has done a phenomenal job on introducing users to setting up a lab environments and using tools like Metasploit, Nessus, Maltego, aircrack, and many more. It removed the mystery of how systems are hacked and how anyone with the right mind and technical knowledge could test their own personal network. Always abide by local and federal laws regarding computers.

Sources: Master of Science - Cybersecurity (2017), Bachelor of Science - Computer and Information Science (2010), CompTIA Network+ CE and Security+ CE certified, EC Council Certified Ethical Hacker (CEH).
46 people found this helpful
Helpful
Report
Morgan S.
1.0 out of 5 starsVerified Purchase
Outdated, impossible to follow along
Reviewed in the United States on July 3, 2020
If you''re starting out you will end up spending most of your time on google finding the most recent version of Kali. The version in the book is so outdated you won''t be able to install the tools, or even run the commands to get them going. I had to download the most... See more
If you''re starting out you will end up spending most of your time on google finding the most recent version of Kali. The version in the book is so outdated you won''t be able to install the tools, or even run the commands to get them going.
I had to download the most recent version of kali, the every install I had to look up how to set the tools up from different sources. This book should be removed from amazon as it is not helpful. I looked for a discord or community that could help and lo and behold, you have to contribute to Georgia''s patreon to get an invite to the discord.
This might as well be a scam
12 people found this helpful
Helpful
Report
Justin
3.0 out of 5 starsVerified Purchase
Outdated practice environments can''t be set up
Reviewed in the United States on April 6, 2018
If I could give a 3.5 stars I would. It''s not a bad book but it relies on environments which can''t be setup anymore to follow the examples. I hope she makes a second edition with a docker environment. It would also benefit from additional practice tasks beyond the... See more
If I could give a 3.5 stars I would. It''s not a bad book but it relies on environments which can''t be setup anymore to follow the examples. I hope she makes a second edition with a docker environment. It would also benefit from additional practice tasks beyond the walkthrough.
31 people found this helpful
Helpful
Report
Christopher
2.0 out of 5 starsVerified Purchase
Outdated lab setup guide
Reviewed in the United States on November 4, 2018
This book is outdated and certain sections of the lab setup are no longer available. If you don''t have some Linux experience then you won''t be able to fully setup the labs properly. Also the author removed her own software that covers the entire chapter on mobile device pen... See more
This book is outdated and certain sections of the lab setup are no longer available. If you don''t have some Linux experience then you won''t be able to fully setup the labs properly. Also the author removed her own software that covers the entire chapter on mobile device pen testing. I have found someone that created a whole web page that fixes some of the outdated links and directions, sadly the author doesn''t offer much to update her own book on her website.
13 people found this helpful
Helpful
Report
Angela S.
3.0 out of 5 starsVerified Purchase
Great book but...
Reviewed in the United States on May 3, 2018
This is a great book to start learning about pen testing but unfortunately at this moment it is a bit outdated and the external material hosted by the autor is not longer available.
13 people found this helpful
Helpful
Report
Andrew Wells
3.0 out of 5 starsVerified Purchase
Great book, but wait for second edition to come out
Reviewed in the United States on August 6, 2019
This book would have gotten 5 stars if it were not for the fact that most of the content is extremely difficult if not impossible to recreate in 2019. Most of the labs require specific service packs and patches installed in order for the exploits to work. Finding a copy of... See more
This book would have gotten 5 stars if it were not for the fact that most of the content is extremely difficult if not impossible to recreate in 2019. Most of the labs require specific service packs and patches installed in order for the exploits to work. Finding a copy of Windows XP is next to impossible these days, let alone with the right service pack and patch level. The author of the book certainly knows her stuff, but I would recommend not spending the money at this time and instead wait for her second edition to come out (which I believe she is currently working on). I will be buying her second edition when it comes out.
6 people found this helpful
Helpful
Report
Ken
5.0 out of 5 starsVerified Purchase
A great introduction to penetration testing
Reviewed in the United States on February 22, 2018
A great introduction to penetration testing. I love the hands on approach to learning. You more than likely will have issues running all the examples in the book verbatim due to later versions of the various software involved or the lack of access to old windows operating... See more
A great introduction to penetration testing. I love the hands on approach to learning. You more than likely will have issues running all the examples in the book verbatim due to later versions of the various software involved or the lack of access to old windows operating systems for the labs; but if you focus on the content rather than being able to work out everything exactly in the book, it lays out a great foundation to learn about penetration testing.
3 people found this helpful
Helpful
Report
kris miller
1.0 out of 5 starsVerified Purchase
I wouldn''t if I were you.
Reviewed in the United States on February 3, 2020
You won''t be able to do much in this book since 90% of it is out of date and doesn''t work the same anymore. It''s from 2014. And no one affiliated with it will contact you back.
2 people found this helpful
Helpful
Report

Top reviews from other countries

T Tennyson
5.0 out of 5 starsVerified Purchase
A concise and approachable introduction to pentesting
Reviewed in the United Kingdom on August 9, 2017
This is probably the best introduction to pentesting book out there, and in the absence of a guide aligned with Offensive Security''s notorious and esteemed OSCP certification, it is also the best option for anyone preparing for that course. Admittedly some of the links no...See more
This is probably the best introduction to pentesting book out there, and in the absence of a guide aligned with Offensive Security''s notorious and esteemed OSCP certification, it is also the best option for anyone preparing for that course. Admittedly some of the links no longer work, but workarounds for them are easy to find if you have a search online, which is probably a skill you should be getting comfortable with if you''re going down this road anyway. Weidman has mentioned on her Twitter feed that she''s currently researching new vulnerabilities and material for the second edition, but I wouldn''t expect to see that in the near future. Check out her free videos on Cybrary as well - her Advanced Penetration Testing course closely mirrors the layout of this book.
7 people found this helpful
Report
Roger's Brother
5.0 out of 5 starsVerified Purchase
Good intro to the topic
Reviewed in the United Kingdom on July 11, 2017
An excellent introduction. I downloaded the sample text and worked with it to give me a feel for the scope of the book and the level of difficulty. I then downloaded the whole text and have started work, using the latest version of Kali and adapting command lines, etc. from...See more
An excellent introduction. I downloaded the sample text and worked with it to give me a feel for the scope of the book and the level of difficulty. I then downloaded the whole text and have started work, using the latest version of Kali and adapting command lines, etc. from the book to reflect this. So far so good, but NOT for the faint hearted! Tip - I have found that the Kali Virtual Machine (in Virtual Box) runs a *lot* faster if you use a static disk size instead of the default dynamic disk. There''s a lot of info on the web about this.
5 people found this helpful
Report
SuperFastLuke
2.0 out of 5 starsVerified Purchase
Out of date and author questionable.
Reviewed in the United Kingdom on January 22, 2019
Stay away from this book, it’s dry, lacks personality and the exercises are dated. Georgia proudly states get in contact for up to date resources then, doesn’t reply. And when you do eventually get a reply by hounding her on twitter etc. she generally states I’m very busy...See more
Stay away from this book, it’s dry, lacks personality and the exercises are dated. Georgia proudly states get in contact for up to date resources then, doesn’t reply. And when you do eventually get a reply by hounding her on twitter etc. she generally states I’m very busy running my own enterprise and I don’t really have time to respond to your request. The book is filled with her own self importance and as an absolute beginner this book really sidelined the importance of community in the infosec space.
8 people found this helpful
Report
artuk
5.0 out of 5 starsVerified Purchase
Essential reading to learn Pentesting
Reviewed in the United Kingdom on July 21, 2015
I decided to learn Pentesting/Ethical Hacking as a retirement project and this is the only book that actually starts at the begining, and explains in detail how to setup a testing lab on a single machine, so you can actually do some REAL testing. I''m also impressed that the...See more
I decided to learn Pentesting/Ethical Hacking as a retirement project and this is the only book that actually starts at the begining, and explains in detail how to setup a testing lab on a single machine, so you can actually do some REAL testing. I''m also impressed that the book sticks to it''s title and is about Pentesting and doesn''t waste hundreds of pages on Coding which is how other Pentesting books fill far too many pages. I have several other Pentesting books but this way ahead of them all.
12 people found this helpful
Report
PublicNameRequired
2.0 out of 5 starsVerified Purchase
Wait For A Refresh
Reviewed in the United Kingdom on August 13, 2020
I have a good knowledge of computers and i work in software development and have done for a number of years so would say I was quite technically minded. Now you have my background, I bought this but swiftly returned it. Looks a great book but you need a copy of Windows XP...See more
I have a good knowledge of computers and i work in software development and have done for a number of years so would say I was quite technically minded. Now you have my background, I bought this but swiftly returned it. Looks a great book but you need a copy of Windows XP and Windows 7. These I can do but you also need to download programs such as Nessus however the version in the book is no longer available and you aren''t even able to access the website for Nessus through Kali. No amount of Google has resolved the issues for me. I dont understand how other people writing recent reviews here have gotten through this book but I can''t even ask because theres no ''ask a question'' about this item. Quite frankly I''d wait for an updated version which apparently Georgia is writing. This one is unfortunately past it.
2 people found this helpful
Report
See all reviews
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who bought this item also bought

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who viewed this item also viewed

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Pages with related products.

  • introduction to computers
  • introduction to programming
  • computer network
  • enterprise security
  • network programming
  • linux security

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale

2021 Penetration Testing: discount A Hands-On sale Introduction to Hacking sale