Search by title, author or ISBN

Penetration Testing: A Hands-On Introduction to Hacking

Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, ISBN: 9781593275648
Add an alert Add to a list

Add a alert

Enter prices below and click 'Add'. You will receive an alert when the book is available for less than the new or used price you specify.

Alert if:
Close

Add this book to a list

You can add this book to any one of your lists. Just select the list below, and click 'Add'.

Close
ISBN: 9781593275648
Publisher: No Starch Press
Published: 9 May, 2014
Format: Paperback
Language: English
Links Australian Libraries (Trove)

Please describe the issue

If you have noticed an incorrect price, image or just something you'd like to tell us, enter it below. Please include your email address if you'd like a reply.

Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: * Crack passwords and wireless network keys with brute-forcing and wordlists * Test web applications for vulnerabilities * Use the Metasploit Framework to launch exploits and write your own Metasploit modules * Automate social-engineering attacks * Bypass antivirus software * Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

NEW ITEMS
Prices in $USD ( Prices updated . )
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
USED ITEMS
Prices in $USD
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...

Historical Prices

Loading...
This graph is for informational purposes only. Occasionally pricing data is captured incorrectly, through bugs in Booko or the stores supplying data, which may distort the graph, providing undue hope that even lower prices sometimes appear.

Recently Updated