Penetration Testing: A Hands-On Introduction to Hacking and over one million other books are available for Amazon Kindle. Learn more
Buy New
$30.34
Qty:1
  • List Price: $49.95
  • Save: $19.61 (39%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $11.57
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Penetration Testing: A Hands-On Introduction to Hacking Paperback – June 8, 2014

ISBN-13: 978-1593275648 ISBN-10: 1593275641 Edition: 1st

Buy New
Price: $30.34
37 New from $27.61 12 Used from $20.88
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$30.34
$27.61 $20.88

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Penetration Testing: A Hands-On Introduction to Hacking + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Price for all three: $59.41

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 528 pages
  • Publisher: No Starch Press; 1 edition (June 8, 2014)
  • Language: English
  • ISBN-10: 1593275641
  • ISBN-13: 978-1593275648
  • Product Dimensions: 9.2 x 7.1 x 1.3 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (15 customer reviews)
  • Amazon Best Sellers Rank: #64,113 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Georgia Weidman is a penetration tester, researcher, and the founder of Bulb Security, a security consulting firm. She has presented at conferences around the world, including BlackHat, Shmoocon, and Derbycon, and teaches classes on topics like penetration testing, mobile hacking, and exploit development. In 2012, she was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.1 out of 5 stars
5 star
9
4 star
3
3 star
0
2 star
1
1 star
2
See all 15 customer reviews
On the other hand I think the book contains too much screenshots.
Javier
I found this book to be well laid out with lots of explanations and an easy to follow methodology.
Martin Bos
Great course book for anyone wanting to start or develop themselves in penetration testing.
Alper Basaran

Most Helpful Customer Reviews

5 of 6 people found the following review helpful By Martin Bos on July 21, 2014
Format: Kindle Edition Verified Purchase
Penetration testing and hacking is a sexy subject. With all of the big public breaches every year, security has come to the forefront of many peoples minds and the demand for young skilled hackers is greater than ever. The problem is that many of these would be hackers have no idea where to begin. They don't have money for higher education of fancy certifications, so where do we as a security community tell them to begin. I always point people at books. They are generally inexpensive and easy to get. I have been doing penetration testing for a number of years professionally so I am familiar with all of the topics in this book already, however, I am constantly reading material like this so that I can find the best resources to point out to new hackers.

I found this book to be well laid out with lots of explanations and an easy to follow methodology. I believe some of the people who have previously reviewed the book forgot what it is like to start with zero knowledge. I know when I was starting in hacking, I was thankful for as many screenshots as possible so I knew I was entering the correct commands. I especially like the way the book follows the Penetration Testing Execution Standard (PTES).

If you are new to hacking or penetration testing, this is the perfect resource to get you started and help you determine if this is the correct career path for you!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 12 people found the following review helpful By Javier on June 24, 2014
Format: Paperback
Penetration testing, also known as 'pentesting', is the activity of simulating real attacks to assess the risks associated with potential security breaches. On a pentest, the testers not only try to discover vulnerabilities but also exploit them in order to assess what attackers might gain after a successful exploitation.

This book is a basic introduction to hacking. It is a good source of material to persons starting in the pentesting world or looking for the right tools and approaches used by hackers. It covers the stages of a professional pentesting too.

The book looks oriented to basic training. It introduces quite concepts, ideas and techniques but all this stuff is not covered in depth. The author added some references and good links in place though.

The book is organized along five parts: I The basics, II Assessments, III Attacks, IV Development and V Mobile Hacking. The contents are straight and they are a good overview as a whole.

I found interesting the author's approach to set up a virtual lab where the reader is able to download vulnerable software in order to exploit it. Some of the tools used in this virtual lab are metasploit, kali, nessus and so on. The book makes a good job explaining step by step the different technical exploitations.

On the other hand I think the book contains too much screenshots. Some of them are not useful (intermediate screens) or they lack of context (screenshots of different applications with frozen values, etc). I think the author could link the project original documentation and save some space and time.

In summary, I think this book will be useful to beginners and readers with a first exposure to pentesting. It makes a good job explaining well-known hacks step-by-step and it offers a good overview of the current scene of pentesting.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 4 people found the following review helpful By Alt_key on July 23, 2014
Format: Paperback Verified Purchase
I purchased this book as a supplement for a class I'm taking in the fall. I've never really done any exploitation in the past, and wanted to get a handle on the basics before tackling some course material.

The book is nicely laid out and is easy to understand. I like the screenshots included, as it gave me a visual representation of what the author is talking about. The screenshots of console commands and printouts especially are nice, as they are labeled and referenced in the text by label, which I find helpful. This book works best when following along with the provided resources.

I enjoyed working my way through this book, and have suggested it to the course instructor for my course in the fall.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By Perry Norton on July 25, 2014
Format: Paperback Verified Purchase
I have tried hacking before, years ago with no success. There are a lot more tools now (I've learned) and I'm sure there is a lot more info online but finding the right info and things that actually work can be a daunting task in itself. You can find the info you need online for anything these days if you want to work that hard. I don't. I especially like all the screen shots. I hate it when the instructions take you through multiple steps and then show you a screenshot. When mine doesn't look like theirs, I have no clue where I went wrong. Thanks to all those screenshots, that doesn't happen with this book. Big plus!

I saw this book and thought it would make an interesting summer project. And it has been! Setting up the lab was challenging but the instructions were great. Be prepared for a lot of "I did it!" rushes as you work through this book. I especially enjoyed the Exploit Development chapters. I can't compare it to other books on the subject but you won't be disappointed with this one. It is truly a great book for beginners on the subject. It does not make you an expert but I feel I know enough to be of use on a team of pentesters.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By David T. Klein on July 26, 2014
Format: Paperback
Georgia Weidman delivers a work that eschews the conventional wisdom that demands an upcoming professional must pay their dues slogging through impenetrable whitepapers, obtuse and incomplete man-pages and doing snuffy-work. While much of the material can be found elsewhere, no other author assembles it into one place, into one coherent curriculum that blends "how" with "why". With lower impedance at the onset, the practitioner can move on to meaningful, valuable work sooner.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews

Search

What Other Items Do Customers Buy After Viewing This Item?