Unavailable
Unavailable
Unavailable
Ebook1,156 pages7 hours
Penetration Testing: A Hands-On Introduction to Hacking
Rating: 4 out of 5 stars
4/5
()
Currently unavailable
Currently unavailable
About this ebook
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
–Crack passwords and wireless network keys with brute-forcing and wordlists
–Test web applications for vulnerabilities
–Use the Metasploit Framework to launch exploits and write your own Metasploit modules
–Automate social-engineering attacks
–Bypass antivirus software
–Turn access to one machine into total control of the enterprise in the post exploitation phase
You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
–Crack passwords and wireless network keys with brute-forcing and wordlists
–Test web applications for vulnerabilities
–Use the Metasploit Framework to launch exploits and write your own Metasploit modules
–Automate social-engineering attacks
–Bypass antivirus software
–Turn access to one machine into total control of the enterprise in the post exploitation phase
You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
LanguageEnglish
PublisherNo Starch Press
Release dateJun 14, 2014
ISBN9781593275952
Unavailable
Related to Penetration Testing
Related ebooks
Instant Netcat Starter Rating: 4 out of 5 stars4/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography Rating: 0 out of 5 stars0 ratingsPractical Pentesting Guide: Preparation for Certification and Ethical Hacking Rating: 0 out of 5 stars0 ratingsHACKING: Unveiling the Secrets of Cybersecurity and Ethical Hacking (2024 Guide for Beginners) Rating: 0 out of 5 stars0 ratingsAdvanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsKali Linux CLI Boss: Novice To Command Line Maestro Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker Second Edition Rating: 0 out of 5 stars0 ratingsDetained Rating: 0 out of 5 stars0 ratingsUbuntu: MOTU Developer Rating: 0 out of 5 stars0 ratingsNMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library Rating: 0 out of 5 stars0 ratingsTCP/IP: Network+ Protocols And Campus LAN Switching Fundamentals Rating: 0 out of 5 stars0 ratingsBuilding Your Own GPT: A Step-by-Step Guide to Creating Custom AI Models Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker C.E.H v11 Exam Prep And Dumps Rating: 0 out of 5 stars0 ratingsFar Cry Primal Game Cheats, DLC, PS4, Xbox One, Cheats Guide Unofficial Rating: 0 out of 5 stars0 ratingsVirtualization Security: Protecting Virtualized Environments Rating: 3 out of 5 stars3/5Ultimate Pentesting for Web Applications Rating: 0 out of 5 stars0 ratingsFixing Common Computer Problems: A Comprehensive Troubleshooting Guide Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsHacking with Kali Linux: A Beginner’s Guide to Cybersecurity and Penetration Testing Rating: 0 out of 5 stars0 ratingsEvaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware Rating: 0 out of 5 stars0 ratingsAI Development for the Modern World: A Comprehensive Guide to Building and Integrating AI Solutions Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Practice Tests Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsUnix And Linux System Administration Handbook: Mastering Networking, Security, Cloud, Performance, And Devops Rating: 0 out of 5 stars0 ratingsThe Mac Hacker's Handbook Rating: 0 out of 5 stars0 ratingsDocker Networking Cookbook Rating: 0 out of 5 stars0 ratingsHow Hackers Steal Wi-Fi Passwords and How to Stop Them: Hacking, #3 Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/548 Really Useful Web Sites Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5UX/UI Design Playbook Rating: 4 out of 5 stars4/5Web Design For Dummies Rating: 4 out of 5 stars4/5WordPress For Dummies Rating: 0 out of 5 stars0 ratingsMore Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Canva Tips and Tricks Beyond The Limits Rating: 3 out of 5 stars3/5Publishing E-Books For Dummies Rating: 4 out of 5 stars4/5Learn NodeJS in 1 Day: Complete Node JS Guide with Examples Rating: 3 out of 5 stars3/5Get Into UX: A foolproof guide to getting your first user experience job Rating: 4 out of 5 stars4/5The Basics of User Experience Design by Interaction Design Foundation Rating: 4 out of 5 stars4/5SEO For Dummies Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5JavaScript All-in-One For Dummies Rating: 5 out of 5 stars5/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5
Reviews for Penetration Testing
Rating: 4.166666666666667 out of 5 stars
4/5
6 ratings2 reviews
- Rating: 5 out of 5 stars5/5
Nov 14, 2024
DELAY : 50
Mouse : 257 : 260 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 259 : 261 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 261 : 261 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 262 : 262 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 265 : 263 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 268 : 264 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 272 : 266 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 279 : 269 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 287 : 273 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 295 : 276 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 303 : 280 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 313 : 282 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 324 : 285 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 334 : 289 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 343 : 293 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 352 : 296 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 360 : 300 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 369 : 303 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 376 : 306 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 382 : 308 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 387 : 311 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 392 : 313 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 395 : 315 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 398 : 317 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 400 : 318 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 400 : 318 : Move : 0 : 0 : 0
DELAY : 50
Mouse : 401 : 319 : Move : 0 : 0 : 0
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : F : KeyDown
DELAY : 50
Keyboard : F : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyUp
DELAY : 50
Keyboard : Enter : KeyDown
DELAY : 50
Keyboard : Enter : KeyUp
DELAY : 50
Keyboard : ControlLeft : KeyDown
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp
DELAY : 50
Keyboard : Tab : KeyDown
DELAY : 50
Keyboard : Tab : KeyUp - Rating: 4 out of 5 stars4/5
Sep 11, 2021
This first edition contained a swath of editorial errors, especially in the code examples. That slowed my progress considerably and required far more repetition than I care for. Still, the book was insightful and instructive.