Advanced Penetration Testing: Hacking the World's Most Secure Networks 1st Edition

4.8 out of 5 stars 81 ratings
ISBN-13: 978-1119367680
ISBN-10: 9781119367680
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell?
<Embed>
Used: Good | Details
Sold by Zoverstocks
Condition: Used: Good
Comment: All books are inspected and guaranteed. All dispatched within 1 - 3 working days from the UK
Access codes and supplements are not guaranteed with used items.
15 Used from $28.88
+ $2.99 shipping
In Stock.
Ships from and sold by Amazon.com.
Available at a lower price from other sellers that may not offer free Prime shipping.
Arrives: Sunday, Aug 16 Details
Fastest delivery: Thursday, Aug 13 Details
List Price: $50.00
Save: $17.39 (35%)
16 New from $33.85
& FREE Shipping. Details

Advanced Penetration Test... has been added to your Cart

Available at a lower price from other sellers that may not offer free Prime shipping.

Black lives matter. Books to read right now.
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Frequently bought together

  • Advanced Penetration Testing: Hacking the World's Most Secure Networks
  • +
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
  • +
  • Rtfm: Red Team Field Manual
Total price: $69.29
Buy the selected items together

Special offers and product promotions


From the Publisher

Penetration Testing Advanced Penetration Testing
Penetration Testing Essentials Advanced Penetration Testing: Hacking the World's Most Secure Networks
Product Format Paperback Paperback
Audience Level Beginner Intermediate to Advanced
Content Length 360 pages 288 pages
Author Sean-Philip Oriyano Wil Allsop
Pub Date December 2016 March 2017
Imprint Sybex Wiley
Product Description Includes essential coverage of the latest penetration testing techniques with content on breaking and entering methods, information gathering, scanning, enumeration, covering your tracks, targeting wireless networks, escaping and evading detection, building a pen testing lab, developing a pen testing tool box, and more Includes advanced coverage of the latest penetration testing techniques with content on creating attack vectors, moving unseen through a target enterprise, employing social engineering strategies, establishing a robust command-and-control structure, using advanced data exfiltration techniques, escalating privilege, operating systems using harvested credentials, and creating custom code with VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more

Editorial Reviews

From the Back Cover

HOW TO ESTABLISH AN IMPENETRABLE LINE OF DEFENSE USING EVERYTHING IN THE PROFESSIONAL HACKER'S BAG OF TRICKS

Typical penetration testing is highly formulaic and involves little more than time-limited network and application security audits. If they are to have any hope of defending their assets against attacks by today's highly motivated professional hackers, high-value targets will have to do a better job of hardening their IT infrastructures. And that can only be achieved by security analysts and engineers fully versed in the professional hacker's manual of dirty tricks and penetration techniques.

Written by a top security expert who has performed hacking and penetration testing for Fortune 100 companies worldwide, Advanced Penetration Testing: Hacking the World's Most Secure Networks schools you in advanced techniques for targeting and compromising high-security environments that aren't taught in any certification prep or covered by common defense scanners. Author Wil Allsopp goes well beyond Kali linux and Metasploit to provide a complex, highly realistic attack simulation. Taking a multidisciplinary approach combining social engineering, programming, and vulnerability exploits, he teaches you how to:

  • Discover and create attack vectors
  • Move unseen through a target enterprise and reconnoiter networks, operating systems, and test structures
  • Employ social engineering strategies to create an initial compromise
  • Establish a beachhead and leave a robust command-and-control structure in place
  • Use advanced data exfiltration techniques―even against targets without direct Internet connections
  • Utilize advanced methods for escalating privilege
  • Infiltrate deep into networks and operating systems using harvested credentials
  • Create custom code using VBA, Windows® Scripting Host, C, Java®, JavaScript®, Flash, and more

About the Author

Wil Allsopp is an IT security expert with 20 years experience, specializing in red team engagements, penetration testing, vulnerability assessment, security audits, secure source code review, social engineering, and advanced persistent threats. He has performed ethical hacking and penetration testing for numerous Fortune 100 companies.


Product details

Customer reviews

4.8 out of 5 stars
4.8 out of 5
81 customer ratings
How does Amazon calculate star ratings?
Reviewed in the United States on July 9, 2017
Verified Purchase
15 people found this helpful
Comment Report abuse
Reviewed in the United States on August 22, 2018
Verified Purchase
6 people found this helpful
Comment Report abuse
Reviewed in the United States on April 21, 2017
Verified Purchase
15 people found this helpful
Comment Report abuse
Reviewed in the United States on December 1, 2017
Verified Purchase
4 people found this helpful
Comment Report abuse
Reviewed in the United States on April 4, 2018
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United States on November 28, 2017
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United States on September 6, 2018
Verified Purchase
One person found this helpful
Comment Report abuse
Reviewed in the United States on June 19, 2017
Verified Purchase
8 people found this helpful
Comment Report abuse

Top international reviews

-:-
5.0 out of 5 stars Best recent pentesting book, although not low level hacking.
Reviewed in the United Kingdom on April 20, 2018
Verified Purchase
2 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Phil
5.0 out of 5 stars By far the best book I've read in years
Reviewed in the United Kingdom on August 29, 2017
Verified Purchase
2 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Dave
5.0 out of 5 stars This book is a wonderful example of how all the little "tricks of the ...
Reviewed in the United Kingdom on May 2, 2017
Verified Purchase
5 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Dean X
5.0 out of 5 stars Good book
Reviewed in the United Kingdom on January 21, 2020
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Clint Beastwood
5.0 out of 5 stars Great Book
Reviewed in the United Kingdom on August 7, 2018
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
fuZZy
4.0 out of 5 stars Highfly aber spannend
Reviewed in Germany on November 18, 2017
Verified Purchase
5 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Hurdan0Games
5.0 out of 5 stars Genial!!
Reviewed in Spain on July 17, 2017
Verified Purchase
3 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Alessandro P.
5.0 out of 5 stars Great, not for beginners
Reviewed in Italy on August 26, 2017
Verified Purchase
4 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
WasdyMcWasduous
5.0 out of 5 stars Técnico pero muy ameno de leer
Reviewed in Spain on August 18, 2019
Verified Purchase
One person found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Douglas Arruda da Silva
5.0 out of 5 stars Conteudo bom, excelente para revisitar temas essenciais
Reviewed in Brazil on October 15, 2017
Verified Purchase
5 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Sandro
5.0 out of 5 stars Coinvolgente ed estremamente significativo
Reviewed in Italy on November 14, 2018
Verified Purchase
One person found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
alexis
4.0 out of 5 stars Good but on the short side
Reviewed in Canada on September 23, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Travis
5.0 out of 5 stars Great book packed with useful information
Reviewed in Canada on May 9, 2017
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Anthony St Bernard
5.0 out of 5 stars Book
Reviewed in Canada on July 30, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
chec11
5.0 out of 5 stars Great so far.
Reviewed in Canada on December 7, 2017
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Pages with related products. See and discover other items: computer code, computer network, computer networks, In Testing