Home » Computer » Penetration Testing: A Hands-On Introduction to Hacking 1st Edition

Penetration Testing: A Hands-On Introduction to Hacking 1st Edition

Book Name: Penetration Testing: A Hands-On Introduction to Hacking 1st Edition
Author: Weidman, Georgia
Publisher: No Starch Press
ISBN-10, 13: 1593275641,978-1593275648
Year: 2014
Pages: 528 pages
Language: English
File size: 12 MB
File format: PDF,EPUB

Penetration Testing: A Hands-On Introduction to Hacking 1st Edition Pdf Book Description:

I decided to write this book because it was the sort of book I wish I had had when I was starting out in information security. Though there are certainly more informative websites out there than when I first started, I still find it’s difficult for a beginner to know what to read first and where to get the expected prerequisite skills. Likewise, there are a lot of books on the market—several great ones on advanced topics, which require some background knowledge, and many good books aimed at beginners, which cover a significant amount of theory. But I haven’t found anything that says everything I want to say to the aspiring pentester who emails me looking for a place to start in information security. In my teaching career I’ve always found that my favorite course to teach is Introduction to Pentesting. The students always have a thirst for knowledge that is lots of fun to be around. Thus, when I was approached by No Starch Press to write a book, this was the book I proposed. When I announced it, many people assumed I was writing a mobile security book, but while I considered that, I thought an introduction to pentesting would make the biggest impact on the audience I most wanted to reach.A book like this would not be possible without many years of dedicated work on the part of the information security community.

The tools and techniques discussed throughout this book are some of the ones my colleagues and I use regularly on engagements, and they’ve been developed through the combined efforts of pentesters and other security experts all over the world. I’ve contributed to some of these open source projects (such as Mona.py, which we’ll use in the exploit development chapters), and I hope this book will inspire you to do the same. I want to take this opportunity to thank Offensive Security for creating and maintaining the Kali Linux pentesting distribution used widely in the field and throughout this book. A huge amount of credit also goes to the core developers of the Metasploit Framework, as well as its numerous community contributors. Thanks too to all the pentesters and researchers who have shared their knowledge, discoveries, and techniques with the community so that we can use them to assess the security posture of our clients more effectively, and so that teachers like me can use them with our students. Thanks as well to the creators of the great books, blog posts, courses, and so on that have helped me achieve my goal of becoming a professional pentester. I now hope to share the knowledge I’ve gained with other aspiring pentesters.

DMCA Disclaimer: This site complies with DMCA Digital Copyright Laws. Please bear in mind that we do not own copyrights to these books. We’re sharing this material with our audience ONLY for educational purpose. We highly encourage our visitors to purchase original books from the respected publishers. If someone with copyrights wants us to remove this content, please contact us immediately.All books on the edubookpdf.com are free and NOT HOSTED ON OUR WEBSITE. If you feel that we have violated your copyrights, then please contact us immediately (click here).

Add a Comment

Your email address will not be published. Required fields are marked *