Goodreads helps you keep track of books you want to read.
Start by marking “Penetration Testing: A Hands-On Introduction to Hacking” as Want to Read:
Penetration Testing: A Hands-On Introduction to Hacking
Enlarge cover
Rate this book
Clear rating
Open Preview

Penetration Testing: A Hands-On Introduction to Hacking

4.19  ·  Rating details ·  277 ratings  ·  21 reviews

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs

...more
Kindle Edition, 528 pages
Published May 29th 2014 by No Starch Press (first published May 22nd 2014)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Penetration Testing, please sign up.

Be the first to ask a question about Penetration Testing

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

Showing 1-30
Average rating 4.19  · 
Rating details
 ·  277 ratings  ·  21 reviews


More filters
 | 
Sort order
Start your review of Penetration Testing: A Hands-On Introduction to Hacking
karzee
Feb 05, 2016 rated it it was amazing  ·  review of another edition
To learn the different domains of security and penetration testing,this is one of the best books around.
Jovany Agathe
Feb 20, 2020 rated it it was amazing  ·  review of another edition
Shelves: favorites
This book was written by a security expert, researcher, and trainer Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking teaches the fundamental skills that every penetration tester needs. You will build a virtual lab with Kali Linux and a couple of vulnerable virtual machines and you will run through multiple scenarios in this environment. Tools like Wireshark, Nmap and Burp Suite are being used in this book, amongst many others.
Merijn
May 26, 2017 rated it it was amazing  ·  review of another edition
Absolutely fantastic!
Freddie Barr-Smith
Very good. Perhaps the reference book i've used most during sitting the OSCP. ...more
Seng Wee Wong
May 04, 2020 rated it it was amazing  ·  review of another edition
This review has been hidden because it contains spoilers. To view it, click here.
Toto Parks
Jan 21, 2018 rated it it was amazing  ·  review of another edition
This was one of our textbooks from our Red Teaming class last semester. The book uses a step-by-step approach in configuring and deploying different penetration testing tools, real-world hacking scenarios and how they are executed and explains some computer science theories (buffer overflows, hashes, TCP/IP, etc) behind the attacks. You get a much broader understanding on what you are doing as a pen tester. Not bad for an introductory book.

The author is active in the penetration testing industry
...more
Daniel Barenboim
An extremely thorough book that offers more than introductions to the topics at hand.
Georgia does a great job at sticking to the main points and not getting distracted.
She guides you along, usually step by step, in each exercise.
Her method aims at teaching you the fundamentals so that you can build upon them in the future, especially since technology is constantly changing and these hacks are evolving.
Instead of having you take the easiest route from A to B, you will sometimes find yourself goin
...more
Truc Pham
The author selected quite a few old softwares to demonstrate how people can exploit a vulnerable in some software. One thing I don't like about this "lab setup" is that it includes Windows XP, Windows 7 which readers may face difficulty to find the correct ISO images to install.
The exploitation is kinda one-hit exploit. It's quite obvious vulnerable and I couldn't learn much about the exploitation. Maybe it's because of my learning method. Or maybe it's because the vulnerable machines are instal
...more
Shanni
May 14, 2019 rated it it was amazing  ·  review of another edition
A *really* great introduction to penetration testing, and the author provides all the tools necessary with the book. My only complaint is that it's a bit dated, but that's not the fault of the book, there just hasn't been a book of similar quality that's been published more recently. Note that this book is not for casual reading; it is a step-by-step guide to pentesting and becoming familiar with the tools of the trade. It is a comprehensive and detailed manual that every cybersecurity student s ...more
F
Jul 07, 2018 rated it really liked it  ·  review of another edition
i will back later to read last chapter 20 (smartphone pen test framework)
meanwhile i really enjoyed reading the book had alot of explanation, most of details i knew it before since i read it on other books ,
but it deserve a reading again and refreshing
Yestin
Jul 10, 2019 rated it really liked it  ·  review of another edition
Shelves: tech, infosec, non-fiction
An excellent informational resource. While the content is a bit outdated at this point the author is still very helpful and provides the necessary resources to those who take the time to ask. A great primer for getting in to penetration testing, and the PWK training and OSCP certification.
Steve
Jun 23, 2020 rated it really liked it  ·  review of another edition
This is a great book to introduce many different concepts to people early in thier security career, or, folks just interested in pickling up a few new skills. The material in vol1 is now dated; however, none of the 1 and 0 are still 1 and 0. I look forward to vol 2 (I hope) in 2021.
Michal
Jul 28, 2020 rated it really liked it  ·  review of another edition
Very practical guide, albeit a little out of date. Recommended reading for infosec enthusiasts.
René
Dec 20, 2019 rated it it was amazing  ·  review of another edition
Excellent
Phil
Jan 16, 2021 rated it really liked it  ·  review of another edition
Good overview of the field and process.
Datit Nasir
Jul 25, 2020 rated it really liked it  ·  review of another edition
A hands-on practical step by step training book for a pentester. with this book was how I got to learn about web application pentest.
Isaiah Halsey
Aug 10, 2020 rated it it was amazing  ·  review of another edition
It is a great book that has helped me study for my security + certification
Sam
Oct 19, 2020 rated it liked it  ·  review of another edition
Georgia's book is great. It is also sadly outdated as many of the labs require websites and tools that are either no longer up or deprecated.

Can't wait for the second edition though!
...more
Delhi Irc
Location: GG5 IRC
Accession No: DL028871
Mirjam
Aug 24, 2019 rated it it was amazing  ·  review of another edition
Great handbook! Due to the fast development of technology it is a bit out of date already. But a new version is under it's way. ...more
Lê Minh Chánh
rated it it was amazing
Apr 23, 2016
Maxwell Wethington
rated it it was amazing
Jan 01, 2018
Mohamad Al Salty
rated it it was amazing
Feb 13, 2021
Spencer
rated it it was amazing
Jun 14, 2014
Luke H
rated it liked it
Dec 29, 2019
Joker
rated it liked it
May 25, 2019
Siwar
rated it really liked it
Jul 18, 2020
Joshua Blake
rated it really liked it
Dec 05, 2018
Edgar Antonio
rated it really liked it
Nov 14, 2019
Shyawn Karim
rated it it was amazing
Jan 09, 2015
« previous 1 3 4 5 6 7 8 9 10 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Red Team Field Manual (RTFM)
  • Black Hat Python: Python Programming for Hackers and Pentesters
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Metasploit: The Penetration Tester's Guide
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Hacking: The Art of Exploitation
  • Blue Team Field Manual (BTFM)
  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
  • Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
  • Automate the Boring Stuff with Python: Practical Programming for Total Beginners
  • The Art of Deception: Controlling the Human Element of Security
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Social Engineering: The Art of Human Hacking
  • The Linux Command Line
  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

News & Interviews

Ciannon Smart has been holed up in her England home since the pandemic began a year ago, but by no means has she been idle. She’s been on...
18 likes · 4 comments