Penetration Testing: A Hands-On Introduction to Hacking

Rating: 
Amazon Price: N/A (as of July 22, 2018 01:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Continue reading “Penetration Testing: A Hands-On Introduction to Hacking”

The Hacker’s Briefcase (Hacker Magazine Book 1)

Rating: 
Amazon Price: N/A (as of July 21, 2018 15:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices available online.

Wireshark 101: Essential Skills for Network Analysis (Wireshark Solutions Series)

Rating: 
Amazon Price: N/A (as of July 22, 2018 11:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book, which we refer to simply as "Wireshark 101," is based on over 20 years of analyzing networks and teaching key analysis skills. It's the book so many people have asked for and is written with clear, concise instructions covering key analysis tasks.

If you take a quick look at the Table of Contents or Index, you'll see this book is packed with 46 step-by-step labs to help you master these key Wireshark skills. Some of the skills covered include:
Continue reading “Wireshark 101: Essential Skills for Network Analysis (Wireshark Solutions Series)”

Cybersecurity Exposed: The Cyber House Rules

Rating: 
Amazon Price: $12.99 $12.99 (as of July 22, 2018 07:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Mind the gap…between the actual level of cybersecurity and the amount required to protect you.

Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?
Continue reading “Cybersecurity Exposed: The Cyber House Rules”