Book Name: Penetration Testing: A Hands-On Introduction to Hacking 1st Edition
Author: Weidman, Georgia
Publisher: No Starch Press
ISBN-10, 13: 1593275641,978-1593275648
Year: 2014
Pages: 528 pages
Language: English
File size: 12 MB
File format: PDF,EPUB
I decided to write this book because it was the sort of book I wish I had had when I was starting out in information security. Though there are certainly more informative websites out there than when I first started, I still find it’s difficult for a beginner to know what to read first and where to get the expected prerequisite skills. Likewise, there are a lot of books on the market—several great ones on advanced topics, which require some background knowledge, and many good books aimed at beginners, which cover a significant amount of theory. But I haven’t found anything that says everything I want to say to the aspiring pentester who emails me looking for a place to start in information security. In my teaching career I’ve always found that my favorite course to teach is Introduction to Pentesting. The students always have a thirst for knowledge that is lots of fun to be around. Thus, when I was approached by No Starch Press to write a book, this was the book I proposed. When I announced it, many people assumed I was writing a mobile security book, but while I considered that, I thought an introduction to pentesting would make the biggest impact on the audience I most wanted to reach.A book like this would not be possible without many years of dedicated work on the part of the information security community.
The tools and techniques discussed throughout this book are some of the ones my colleagues and I use regularly on engagements, and they’ve been developed through the combined efforts of pentesters and other security experts all over the world. I’ve contributed to some of these open source projects (such as Mona.py, which we’ll use in the exploit development chapters), and I hope this book will inspire you to do the same. I want to take this opportunity to thank Offensive Security for creating and maintaining the Kali Linux pentesting distribution used widely in the field and throughout this book. A huge amount of credit also goes to the core developers of the Metasploit Framework, as well as its numerous community contributors. Thanks too to all the pentesters and researchers who have shared their knowledge, discoveries, and techniques with the community so that we can use them to assess the security posture of our clients more effectively, and so that teachers like me can use them with our students. Thanks as well to the creators of the great books, blog posts, courses, and so on that have helped me achieve my goal of becoming a professional pentester. I now hope to share the knowledge I’ve gained with other aspiring pentesters.
Pdf Book Name: Office 365 All-in-One For Dummies 1st edition Author: Peter Weverka Publisher: For…
Pdf Book Name: Biology Laboratory Manual 12th Edition Author: Darrell Vodopich (Author), Randy Moore (Author)…
Pdf Book Name: Chemistry and Biology of Beta-Lactams Author: Publisher: ISBN-10, 13: Year: Pages: Pages…
Pdf Book Name: Coyotes: biology, behavior, and management Author: edited by Marc Bekoff ; contributors…
Pdf Book Name: Design Thinking for Engineering: A practical guide Author: Iñigo Cuiñas, Manuel J.…
Pdf Book Name: Irrigation Engineering and Hydraulic Structures Author: S. K. Ukarande Publisher: Springer-Ane Books,…