|
|
San Francisco, CA, May 27, 2014—In Penetration Testing (No Starch Press, June 2014, 528 pp., $49.95, ISBN 9781593275648), computer security expert and trainer Georgia Weidman introduces readers to the core skills and techniques that every penetration tester needs.
In this hands-on beginner's guide, readers build a Kali Linux-based virtual lab to conduct a series of practice penetration tests. Next, Weidman walks them through finding and exploiting vulnerabilities in networks and operating systems using industry-standard tools like Wireshark, Metasploit, Nessus, Nmap, and more. Chapters on exploit development cover stack-based buffer overflows; structured exception handler overwrites; and fuzzing, porting exploits, and writing Metasploit modules.
Readers of Penetration Testing will learn how to:
- Crack passwords with brute-force attacks and wordlists
- Test web applications for vulnerabilities
- Use the Metasploit Framework to launch exploits and write Metasploit modules
- Automate social-engineering attacks to access secure networks
- Bypass antivirus software
- Secure successful penetration into a network during the post-exploitation phase
With its step-by-step discussions and coverage of key penetration testing tools, Penetration Testing is sure to be the go-to introduction to the field for anyone who wants to assess their own defenses or turn penetration testing into a career.
For more information or to request a review copy of Penetration Testing, contact William Pollock at No Starch Press ([email protected], +1.415.863.9900 or visit www.nostarch.com).
About the Author
Georgia Weidman is a penetration tester and researcher, as well as the founder of Bulb Security, a security consulting firm. She presents at conferences around the world, including Black Hat, ShmooCon, and DerbyCon, and teaches classes on topics such as penetration testing, mobile hacking, and exploit development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.
Additional Resources
No Starch Press Catalog Page
Chapter 9: Password Attacks (PDF)
Table of Contents
Detailed Table of Contents (PDF)
Index (PDF)
You Might Also Be Interested In:
Available in fine bookstores everywhere, from http://www.oreilly.com/nostarch, or directly from No Starch Press (http://www.nostarch.com, [email protected], 1-800-420-7240).
About No Starch Press
Founded in 1994, No Starch Press publishes the finest in geek entertainment. Our titles have personality, our authors are passionate, and our books tackle topics that people care about. No Starch Press titles have won the Grand Prize at the San Francisco Book Festival and the Independent Publisher Book Award (the "IPPY") from Independent Publisher.
About O'Reilly
O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, and conferences. Since 1978, O'Reilly Media has been a chronicler and catalyst of cutting-edge development, homing in on the technology trends that really matter and spurring their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participant in the technology community, the company has a long history of advocacy, meme-making, and evangelism.
# # #
O'Reilly is a registered trademark of O'Reilly Media, Inc. All other trademarks are the property of their respective owners.
|