Penetration Testing: A Hands-On Introduction to Hacking and over one million other books are available for Amazon Kindle. Learn more
Buy New
$30.34
Qty:1
  • List Price: $49.95
  • Save: $19.61 (39%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $13.75
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Penetration Testing: A Hands-On Introduction to Hacking Paperback – June 8, 2014

ISBN-13: 978-1593275648 ISBN-10: 1593275641 Edition: 1st

Buy New
Price: $30.34
30 New from $25.99 7 Used from $27.60
Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$30.34
$25.99 $27.60

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Penetration Testing: A Hands-On Introduction to Hacking + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Price for all three: $59.62

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 528 pages
  • Publisher: No Starch Press; 1 edition (June 8, 2014)
  • Language: English
  • ISBN-10: 1593275641
  • ISBN-13: 978-1593275648
  • Product Dimensions: 9.2 x 7.1 x 1.3 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 3.7 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #48,835 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Georgia Weidman is a penetration tester, researcher, and the founder of Bulb Security, a security consulting firm. She has presented at conferences around the world, including BlackHat, Shmoocon, and Derbycon, and teaches classes on topics like penetration testing, mobile hacking, and exploit development. In 2012, she was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.7 out of 5 stars
5 star
5
4 star
1
3 star
0
2 star
1
1 star
2
See all 9 customer reviews
The book is nicely laid out and is easy to understand.
Alt_key
Great course book for anyone wanting to start or develop themselves in penetration testing.
Alper Basaran
On the other hand I think the book contains too much screenshots.
Javier

Most Helpful Customer Reviews

8 of 11 people found the following review helpful By Javier on June 24, 2014
Format: Paperback
Penetration testing, also known as 'pentesting', is the activity of simulating real attacks to assess the risks associated with potential security breaches. On a pentest, the testers not only try to discover vulnerabilities but also exploit them in order to assess what attackers might gain after a successful exploitation.

This book is a basic introduction to hacking. It is a good source of material to persons starting in the pentesting world or looking for the right tools and approaches used by hackers. It covers the stages of a professional pentesting too.

The book looks oriented to basic training. It introduces quite concepts, ideas and techniques but all this stuff is not covered in depth. The author added some references and good links in place though.

The book is organized along five parts: I The basics, II Assessments, III Attacks, IV Development and V Mobile Hacking. The contents are straight and they are a good overview as a whole.

I found interesting the author's approach to set up a virtual lab where the reader is able to download vulnerable software in order to exploit it. Some of the tools used in this virtual lab are metasploit, kali, nessus and so on. The book makes a good job explaining step by step the different technical exploitations.

On the other hand I think the book contains too much screenshots. Some of them are not useful (intermediate screens) or they lack of context (screenshots of different applications with frozen values, etc). I think the author could link the project original documentation and save some space and time.

In summary, I think this book will be useful to beginners and readers with a first exposure to pentesting. It makes a good job explaining well-known hacks step-by-step and it offers a good overview of the current scene of pentesting.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 14 people found the following review helpful By Timothy W. Wright on June 25, 2014
Format: Paperback
Got this book to give it a try and found it to be a rehash of virtually the same material you find in countless other books on the subject. The over use of screen shots and skimming over of topics made this a difficult read at best and left me with more questions than answers.

I spend most of my life performing penetration tests for a living so I know how to do this work. However looking for texts that I can use to help junior members of my team is a priority. I thought this book might have been the answer but I was mistaken. So many better resources available for learning penetration testing and this is not one of them.
6 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 1 people found the following review helpful By Martin Bos on July 21, 2014
Format: Kindle Edition Verified Purchase
Penetration testing and hacking is a sexy subject. With all of the big public breaches every year, security has come to the forefront of many peoples minds and the demand for young skilled hackers is greater than ever. The problem is that many of these would be hackers have no idea where to begin. They don't have money for higher education of fancy certifications, so where do we as a security community tell them to begin. I always point people at books. They are generally inexpensive and easy to get. I have been doing penetration testing for a number of years professionally so I am familiar with all of the topics in this book already, however, I am constantly reading material like this so that I can find the best resources to point out to new hackers.

I found this book to be well laid out with lots of explanations and an easy to follow methodology. I believe some of the people who have previously reviewed the book forgot what it is like to start with zero knowledge. I know when I was starting in hacking, I was thankful for as many screenshots as possible so I knew I was entering the correct commands. I especially like the way the book follows the Penetration Testing Execution Standard (PTES).

If you are new to hacking or penetration testing, this is the perfect resource to get you started and help you determine if this is the correct career path for you!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 1 people found the following review helpful By Alt_key on July 23, 2014
Format: Paperback Verified Purchase
I purchased this book as a supplement for a class I'm taking in the fall. I've never really done any exploitation in the past, and wanted to get a handle on the basics before tackling some course material.

The book is nicely laid out and is easy to understand. I like the screenshots included, as it gave me a visual representation of what the author is talking about. The screenshots of console commands and printouts especially are nice, as they are labeled and referenced in the text by label, which I find helpful. This book works best when following along with the provided resources.

I enjoyed working my way through this book, and have suggested it to the course instructor for my course in the fall.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 6 people found the following review helpful By Alper Basaran on July 1, 2014
Format: Paperback Verified Purchase
I really wish this book was published several years ago when I first started penetration testing. People who are new in this field have to navigate their way through a maze of online tutorials, trainings and overly focused books and try to put an ocean of information in perspective. This book touches every important subject in a way that gives a strong base on which you can develop further. Advanced subjects which can be intimidating at first, such as anti-virus evasion and exploit development are also covered and well explained.
Great course book for anyone wanting to start or develop themselves in penetration testing.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?