Penetration Testing: A Handson Introduction To Hacking

Penetration Testing: A Handson Introduction To Hacking

In Stock
SKU: SONG1593275641
UPC: 884600461290
Brand: No Starch Press
Condition: Used
Regular price$19.67
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Penetration Testers Simulate Cyber Attacks To Find Security Weaknesses In Networks, Operating Systems, And Applications. Information Security Experts Worldwide Use Penetration Techniques To Evaluate Enterprise Defenses.In Penetration Testing, Security Expert, Researcher, And Trainer Georgia Weidman Introduces You To The Core Skills And Techniques That Every Pentester Needs. Using A Virtual Machinebased Lab That Includes Kali Linux And Vulnerable Operating Systems, Youll Run Through A Series Of Practical Lessons With Tools Like Wireshark, Nmap, And Burp Suite. As You Follow Along With The Labs And Launch Attacks, Youll Experience The Key Stages Of An Actual Assessmentincluding Information Gathering, Finding Exploitable Vulnerabilities, Gaining Access To Systems, Post Exploitation, And More.Learn How To:Crack Passwords And Wireless Network Keys With Bruteforcing And Wordliststest Web Applications For Vulnerabilitiesuse The Metasploit Framework To Launch Exploits And Write Your Own Metasploit Modulesautomate Socialengineering Attacksbypass Antivirus Softwareturn Access To One Machine Into Total Control Of The Enterprise In The Post Exploitation Phaseyoull Even Explore Writing Your Own Exploits. Then Its On To Mobile Hackingweidmans Particular Area Of Researchwith Her Tool, The Smartphone Pentest Framework.With Its Collection Of Handson Lessons That Cover Key Tools And Strategies, Penetration Testing Is The Introduction That Every Aspiring Hacker Needs.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: How many pages does this book have? A: This book has five hundred twenty-eight pages. It covers various aspects of penetration testing, making it comprehensive for readers.
  • Q: What is the binding type of this book? A: The book is paperback bound. This makes it lightweight and easy to handle for readers.
  • Q: What are the dimensions of this book? A: The book measures seven point zero one inches in length, one point one nine inches in width, and nine point two five inches in height. These dimensions make it convenient for storage and portability.
  • Q: Who is the author of this book? A: The author is Georgia Weidman. She is a recognized security expert and trainer in the field of penetration testing.
  • Q: What is the main subject of the book? A: The book focuses on penetration testing and hacking techniques. It aims to educate readers on evaluating security weaknesses in systems.
  • Q: How do I use the techniques learned in this book? A: You can use the techniques by following practical lessons outlined in the book. Each lesson includes hands-on labs with tools like Wireshark and Nmap.
  • Q: Is this book suitable for beginners? A: Yes, the book is suitable for beginners. It introduces core skills and techniques needed for penetration testing.
  • Q: What tools does the book cover for penetration testing? A: The book covers tools like Wireshark, Nmap, and Burp Suite. It also includes the Metasploit Framework for launching exploits.
  • Q: Are there any prerequisites for reading this book? A: No formal prerequisites are required. However, a basic understanding of networking and security concepts may be helpful.
  • Q: How should I store this book to keep it in good condition? A: Store the book in a cool, dry place. Avoid direct sunlight to prevent fading and consider keeping it on a shelf upright.
  • Q: Can I clean the book if it gets dirty? A: Yes, you can clean it gently with a dry cloth. Avoid using water or cleaning solutions that could damage the pages.
  • Q: Is this book safe for children? A: No, this book is not suitable for children. It contains subjects related to hacking and cyber security that may not be appropriate.
  • Q: What if the book arrives damaged? A: If the book arrives damaged, you should contact the seller for a return or exchange. Most sellers offer customer support for such issues.
  • Q: How can I contact support if I have questions about this book? A: You can usually contact support through the seller's website or customer service number provided at the time of purchase.
  • Q: Does this book include exercises or labs? A: Yes, the book includes various exercises and labs. These are designed to reinforce the skills and techniques discussed in the text.

Recently Viewed