An Ihren Kindle oder ein anderes Gerät senden


Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden


Penetration Testing: A Hands-On Introduction to Hacking [Kindle Edition]

Georgia Weidman

Kindle-Preis: EUR 21,62 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

  • Länge: 524 Seiten
  • Sprache: Englisch
  • Aufgrund der Dateigröße dauert der Download dieses Buchs möglicherweise länger.
  • Sie haben noch keinen Kindle? Hier kaufen Oder fangen Sie mit einer unserer gratis Kindle Lese-Apps sofort an zu lesen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 21,62  
Taschenbuch EUR 30,95  

Kunden, die diesen Artikel gekauft haben, kauften auch



Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Learn how to:

  • Crack passwords and wireless network keys with brute-forcing and wordlists
  • Test web applications for vulnerabilities
  • Use the Metasploit Framework to launch exploits and write your own Metasploit modules
  • Automate social-engineering attacks
  • Bypass antivirus software
  • Turn access to one machine into total control of the enterprise in the post exploitation phase

You'll even explore writing your own exploits. Then it's on to mobile hacking - Weidman's particular area of research - with her tool, the Smartphone Pentest Framework.

With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf (beta) 4.1 von 5 Sternen  21 Rezensionen
8 von 9 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great for Beginners 26. Juli 2014
Von Perry Norton - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
I have tried hacking before, years ago with no success. There are a lot more tools now (I've learned) and I'm sure there is a lot more info online but finding the right info and things that actually work can be a daunting task in itself. You can find the info you need online for anything these days if you want to work that hard. I don't. I especially like all the screen shots. I hate it when the instructions take you through multiple steps and then show you a screenshot. When mine doesn't look like theirs, I have no clue where I went wrong. Thanks to all those screenshots, that doesn't happen with this book. Big plus!

I saw this book and thought it would make an interesting summer project. And it has been! Setting up the lab was challenging but the instructions were great. Be prepared for a lot of "I did it!" rushes as you work through this book. I especially enjoyed the Exploit Development chapters. I can't compare it to other books on the subject but you won't be disappointed with this one. It is truly a great book for beginners on the subject. It does not make you an expert but I feel I know enough to be of use on a team of pentesters.
10 von 13 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An excellent resource for people looking for an introduction to penetration testing 21. Juli 2014
Von Martin Bos - Veröffentlicht auf
Format:Kindle Edition|Verifizierter Kauf
Penetration testing and hacking is a sexy subject. With all of the big public breaches every year, security has come to the forefront of many peoples minds and the demand for young skilled hackers is greater than ever. The problem is that many of these would be hackers have no idea where to begin. They don't have money for higher education of fancy certifications, so where do we as a security community tell them to begin. I always point people at books. They are generally inexpensive and easy to get. I have been doing penetration testing for a number of years professionally so I am familiar with all of the topics in this book already, however, I am constantly reading material like this so that I can find the best resources to point out to new hackers.

I found this book to be well laid out with lots of explanations and an easy to follow methodology. I believe some of the people who have previously reviewed the book forgot what it is like to start with zero knowledge. I know when I was starting in hacking, I was thankful for as many screenshots as possible so I knew I was entering the correct commands. I especially like the way the book follows the Penetration Testing Execution Standard (PTES).

If you are new to hacking or penetration testing, this is the perfect resource to get you started and help you determine if this is the correct career path for you!
15 von 21 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Penetration Testing. A Hands-On Introduction to Hacking review 24. Juni 2014
Von Javier - Veröffentlicht auf
Penetration testing, also known as 'pentesting', is the activity of simulating real attacks to assess the risks associated with potential security breaches. On a pentest, the testers not only try to discover vulnerabilities but also exploit them in order to assess what attackers might gain after a successful exploitation.

This book is a basic introduction to hacking. It is a good source of material to persons starting in the pentesting world or looking for the right tools and approaches used by hackers. It covers the stages of a professional pentesting too.

The book looks oriented to basic training. It introduces quite concepts, ideas and techniques but all this stuff is not covered in depth. The author added some references and good links in place though.

The book is organized along five parts: I The basics, II Assessments, III Attacks, IV Development and V Mobile Hacking. The contents are straight and they are a good overview as a whole.

I found interesting the author's approach to set up a virtual lab where the reader is able to download vulnerable software in order to exploit it. Some of the tools used in this virtual lab are metasploit, kali, nessus and so on. The book makes a good job explaining step by step the different technical exploitations.

On the other hand I think the book contains too much screenshots. Some of them are not useful (intermediate screens) or they lack of context (screenshots of different applications with frozen values, etc). I think the author could link the project original documentation and save some space and time.

In summary, I think this book will be useful to beginners and readers with a first exposure to pentesting. It makes a good job explaining well-known hacks step-by-step and it offers a good overview of the current scene of pentesting.
17 von 24 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen A failed attempt 26. August 2014
Von antisnatchor - Veröffentlicht auf
I've been asked to review this book by NoStarchPress (thanks!).

It was an ambitious goal to write such book, and I can imagine it's not an easy challenge given the fact that most of us (already in the pentesting business) had very different backgrounds and used different learning approaches. However I have to say I didn't particularly like the book structure nor the amount of information that just barely scratched the surface of too many completely different topics.

The only interesting chapters for someone starting into this field are those from Part IV (exploit development).

Most of other chapters contain either very outdated material (for instance teaching to a newbie how to do client-side exploitation with a 6 years old PDF exploit on Windows XP is not cool) or too much content about very basic things such as installing a bunch of virtual machines or open source tools. If someone wants to become a penetration tester, I guess he should already know pretty well Linux (*BSD/Win/etc..) and virtualization solutions, or anyhow he can find information online about it without the need to buy a book.

Another thing I didn't like is mentioning VirusTotal. Everyone knows that this service share malware analysis data with AV companies, so what's the point of creating your own dropper for LEGAL penetration testing purposes, make it AV undetectable, then submit it to VirusTotal? You wouldn't except that to work in your next pentesting engagement.

Other sections like Web Application Testing contain too little content. For example XSS is quickly explained saying you can trigger an alert(1) as a PoC. Then BeEF is mentioned, but instead of showing some interesting and advanced usage of this attacking framework, the author shows again how to trigger alert(1). What a newbie is supposed to understand?

The book really lacks interesting references to research papers, articles, books and other material that someone reading such a book will need to increase his skill level.

Last thing. Something I think is really missing from this book is a proper intro to some basic coding skills in a language of choice (Ruby or Python or Perl). From the start to page 75 it's all about setting your virtual machines, using Kali linux and so on, while there are only 11 pages (11!) out of 470 about coding. I think coding is very important, every pentester should know how to properly code, and newbies entering the pentesting business should be trained in such way, not teaching them how to merely use tools but instead how to have that lateral thinking needed to find bugs imho.
4 von 6 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen The book is nicely laid out and is easy to understand 23. Juli 2014
Von Alt_key - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
I purchased this book as a supplement for a class I'm taking in the fall. I've never really done any exploitation in the past, and wanted to get a handle on the basics before tackling some course material.

The book is nicely laid out and is easy to understand. I like the screenshots included, as it gave me a visual representation of what the author is talking about. The screenshots of console commands and printouts especially are nice, as they are labeled and referenced in the text by label, which I find helpful. This book works best when following along with the provided resources.

I enjoyed working my way through this book, and have suggested it to the course instructor for my course in the fall.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden