

🔐 Unlock elite hacking skills before your peers do!
No Starch Press Penetration Testing is a highly rated, easy-to-read guide ranked #60 in Computer Hacking books, trusted by over 500 reviewers. It delivers clear, practical knowledge to elevate your cybersecurity expertise and career.
| Best Sellers Rank | #105,783 in Books ( See Top 100 in Books ) #58 in Computer Hacking #242 in Networking & Cloud Computing #10,305 in Higher & Continuing Education Textbooks |
| Customer reviews | 4.6 4.6 out of 5 stars (523) |
| Dimensions | 17.78 x 3.02 x 23.5 cm |
| Edition | 1st |
| ISBN-10 | 1593275641 |
| ISBN-13 | 978-1593275648 |
| Item weight | 964 g |
| Language | English |
| Print length | 528 pages |
| Publication date | 14 June 2014 |
| Publisher | No Starch Press |
A**E
Very worth the purchase.
E**O
Se separó la pasta de las hojas el primer día. Sin embargo, el contenido es bueno.
B**R
After reading, Hacking: The Art of Exploitation, I felt very disappointed because that book doesn't teach you about hacking in the way I was expecting. It only shows you how to test for vulnerabilities in source code and how to attempt exploitation against it, alongside networking programming and cryptology. I also read other hacking books by No Starch Press, and I felt very disappointed, because I wanted a book that can give me the skills to find a job as a professional pen tester, but the books I've read were very theoretical, but almost very impractical. Then, comes this book. A hands-on approach to testing and utilization of penetration software. It touches upon literally almost every tool and technique a pen tester could ever want to practice. It goes through the explanations and illustrations and diagrams that all show you step by step exactly how to perform a penetration test. My favorite chapter was the one that began the Exploit Development part of the book, about Linux exploitation. This is because I wanted a guide that can teach me how buffer overflows function and how to use gdb to develop exploits from scratch. It goes into extreme detail on each and every step that needs to be incorporated to reverse engineer a binary while in memory. I also much enjoyed the chapter about antivirus evasion. Furthermore, the chapter on password attacks was enlightening, as was almost every other chapter. The only chapter I found boring was the one about pen testing mobile devices. This was boring to me because the framework is not included in Linux by default, so I didn't wanna go bananas over it. Using a Livecd and installing new software is annoying. But, when I feel like it, I'll probably take another look at it. After all, the very author of this book developed that framework her very self!
V**T
Good product
S**P
Certes le livre à déjà quelques années, les références de logiciels ont évoluées mais reste très simples à trouver. Des ressources supplémentaires sont dispo sur le page du livre de l'auteur, sur le site de l'éditeur. Les techniques et outils sont non seulement expliquées mais également la méthodologie à utiliser pour effectuer une bonne et juste prestation. Cet ouvrage est non seulement bien écrit mais il se veut pragmatique et essentiel. Le pentesting comme le forensique sont des disciplines exigeantes. Cet ouvrage est excellent.
Trustpilot
3 weeks ago
2 weeks ago