Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.<br><br>In <i>Penetration Testing</i>, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine€“based lab that includes Kali Linux and vulnerable operating systems, you€ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you€ll experience the key stages of an actual assessment€"including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.<br><br>Learn how to:<br>€“Crack passwords and wireless network keys with brute-forcing and wordlists<br>€“Test web applications for vulnerabilities<br>€“Use the Metasploit Framework to launch exploits and write your own Metasploit modules<br>€“Automate social-engineering attacks<br>€“Bypass antivirus software<br>€“Turn access to one machine into total control of the enterprise in the post exploitation phase<br><br>You€ll even explore writing your own exploits. Then it€s on to mobile hacking€"Weidman€s particular area of research€"with her tool, the Smartphone Pentest Framework.<br><br>With its collection of hands-on lessons that cover key tools and strategies, <i>Penetration Testing</i> is the introduction that every aspiring hacker needs.