Description
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In
, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine每based lab that includes Kali Linux and vulnerable operating systems, you*ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you*ll experience the key stages of an actual assessment〞including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
每Crack passwords and wireless network keys with brute-forcing and wordlists
每Test web applications for vulnerabilities
每Use the Metasploit Framework to launch exploits and write your own Metasploit modules
每Automate social-engineering attacks
每Bypass antivirus software
每Turn access to one machine into total control of the enterprise in the post exploitation phase
You*ll even explore writing your own exploits. Then it*s on to mobile hacking〞Weidman*s particular area of research〞with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies,
is the introduction that every aspiring hacker needs.






Reviews
There are no reviews yet.