Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Penetration Testing: A Hands-On Introduction to Hacking [Format Kindle]

Georgia Weidman

Prix conseillé : EUR 31,64 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 45,63
Prix Kindle : EUR 19,99 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 25,64 (56%)

  • Longueur : 528 pages
  • Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger
  • Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.
App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 19,99  
Relié --  
Broché EUR 47,07  

Offre Éclair Kindle Abonnez-vous à la Newsletter Offre Éclair Kindle et recevez un ebook gratuit.

Assurez-vous d'avoir bien coché la case Offre Éclair Kindle, puis cliquez sur "Abonnez-vous" pour vous inscrire. Vous recevrez par email votre code promotionnel permettant d'obtenir votre ebook gratuit.

Descriptions du produit

Présentation de l'éditeur

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Learn how to:

  • Crack passwords and wireless network keys with brute-forcing and wordlists
  • Test web applications for vulnerabilities
  • Use the Metasploit Framework to launch exploits and write your own Metasploit modules
  • Automate social-engineering attacks
  • Bypass antivirus software
  • Turn access to one machine into total control of the enterprise in the post exploitation phase

You'll even explore writing your own exploits. Then it's on to mobile hacking - Weidman's particular area of research - with her tool, the Smartphone Pentest Framework.

With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 10749 KB
  • Nombre de pages de l'édition imprimée : 528 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : No Starch Press; Édition : 1 (1 juin 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00KME7GN8
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°136.508 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.1 étoiles sur 5  24 commentaires
10 internautes sur 11 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great for Beginners 26 juillet 2014
Par Perry Norton - Publié sur Amazon.com
Format:Broché|Achat vérifié
I have tried hacking before, years ago with no success. There are a lot more tools now (I've learned) and I'm sure there is a lot more info online but finding the right info and things that actually work can be a daunting task in itself. You can find the info you need online for anything these days if you want to work that hard. I don't. I especially like all the screen shots. I hate it when the instructions take you through multiple steps and then show you a screenshot. When mine doesn't look like theirs, I have no clue where I went wrong. Thanks to all those screenshots, that doesn't happen with this book. Big plus!

I saw this book and thought it would make an interesting summer project. And it has been! Setting up the lab was challenging but the instructions were great. Be prepared for a lot of "I did it!" rushes as you work through this book. I especially enjoyed the Exploit Development chapters. I can't compare it to other books on the subject but you won't be disappointed with this one. It is truly a great book for beginners on the subject. It does not make you an expert but I feel I know enough to be of use on a team of pentesters.
10 internautes sur 13 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 An excellent resource for people looking for an introduction to penetration testing 21 juillet 2014
Par Martin Bos - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Penetration testing and hacking is a sexy subject. With all of the big public breaches every year, security has come to the forefront of many peoples minds and the demand for young skilled hackers is greater than ever. The problem is that many of these would be hackers have no idea where to begin. They don't have money for higher education of fancy certifications, so where do we as a security community tell them to begin. I always point people at books. They are generally inexpensive and easy to get. I have been doing penetration testing for a number of years professionally so I am familiar with all of the topics in this book already, however, I am constantly reading material like this so that I can find the best resources to point out to new hackers.

I found this book to be well laid out with lots of explanations and an easy to follow methodology. I believe some of the people who have previously reviewed the book forgot what it is like to start with zero knowledge. I know when I was starting in hacking, I was thankful for as many screenshots as possible so I knew I was entering the correct commands. I especially like the way the book follows the Penetration Testing Execution Standard (PTES).

If you are new to hacking or penetration testing, this is the perfect resource to get you started and help you determine if this is the correct career path for you!
28 internautes sur 39 ont trouvé ce commentaire utile 
1.0 étoiles sur 5 A failed attempt 26 août 2014
Par antisnatchor - Publié sur Amazon.com
I've been asked to review this book by NoStarchPress (thanks!).

It was an ambitious goal to write such book, and I can imagine it's not an easy challenge given the fact that most of us (already in the pentesting business) had very different backgrounds and used different learning approaches. However I have to say I didn't particularly like the book structure nor the amount of information that just barely scratched the surface of too many completely different topics.

The only interesting chapters for someone starting into this field are those from Part IV (exploit development).

Most of other chapters contain either very outdated material (for instance teaching to a newbie how to do client-side exploitation with a 6 years old PDF exploit on Windows XP is not cool) or too much content about very basic things such as installing a bunch of virtual machines or open source tools. If someone wants to become a penetration tester, I guess he should already know pretty well Linux (*BSD/Win/etc..) and virtualization solutions, or anyhow he can find information online about it without the need to buy a book.

Another thing I didn't like is mentioning VirusTotal. Everyone knows that this service share malware analysis data with AV companies, so what's the point of creating your own dropper for LEGAL penetration testing purposes, make it AV undetectable, then submit it to VirusTotal? You wouldn't except that to work in your next pentesting engagement.

Other sections like Web Application Testing contain too little content. For example XSS is quickly explained saying you can trigger an alert(1) as a PoC. Then BeEF is mentioned, but instead of showing some interesting and advanced usage of this attacking framework, the author shows again how to trigger alert(1). What a newbie is supposed to understand?

The book really lacks interesting references to research papers, articles, books and other material that someone reading such a book will need to increase his skill level.

Last thing. Something I think is really missing from this book is a proper intro to some basic coding skills in a language of choice (Ruby or Python or Perl). From the start to page 75 it's all about setting your virtual machines, using Kali linux and so on, while there are only 11 pages (11!) out of 470 about coding. I think coding is very important, every pentester should know how to properly code, and newbies entering the pentesting business should be trained in such way, not teaching them how to merely use tools but instead how to have that lateral thinking needed to find bugs imho.
5 internautes sur 7 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 The book is nicely laid out and is easy to understand 23 juillet 2014
Par Alt_key - Publié sur Amazon.com
Format:Broché|Achat vérifié
I purchased this book as a supplement for a class I'm taking in the fall. I've never really done any exploitation in the past, and wanted to get a handle on the basics before tackling some course material.

The book is nicely laid out and is easy to understand. I like the screenshots included, as it gave me a visual representation of what the author is talking about. The screenshots of console commands and printouts especially are nice, as they are labeled and referenced in the text by label, which I find helpful. This book works best when following along with the provided resources.

I enjoyed working my way through this book, and have suggested it to the course instructor for my course in the fall.
1 internautes sur 1 ont trouvé ce commentaire utile 
2.0 étoiles sur 5 Which makes the "pen-testing" portion of this book useless.. 16 janvier 2015
Par Rocka Rolla - Publié sur Amazon.com
The info is okay but the software needed to load is heavily outdated. While some of it is still active others have switched from 32bit to 64bit only. Which makes the "pen-testing" portion of this book useless...
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique