Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab Paperback – Aug 14 2009
There is a newer edition of this item:
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
"Wilhelm has created the ultimate handbook for becoming a pen tester. This is going to help launch many a career." - Richard Stiennon, Chief Research Analyst, IT-Harvest
"Professional Penetration Testing covers everything from ethical concerns, to advance concepts, to setting up your own custom laboratory. It is the most comprehensive and authoritative guide at penetration testing that I have seen. Tom Wilhelm is a true expert in the field who not only is in the trenches on a daily basis, but also takes the time to instruct others on the ways and means of pen testing." -Frank Thornton, Owner, Blackthorn Systems
From the Back Cover
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.
Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners.
- Find out how to turn hacking and pen testing skills into a professional career
- Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
- Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
- Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
- Learn through video – the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment
Inside This Book(Learn More)
Top Customer Reviews
The courses included here are the HPTF and HIPT courses, which are no longer offered via the web site.
The content covers much more than a how-to form some of the tools available in the trade, but actual tips from real life experience on how to get started in the field.
Excellent book. It helped me a lot starting my career!
Most Helpful Customer Reviews on Amazon.com (beta)
PPT offers 18 chapters, with 12 chapters on project management and non-technical issues, and 6 ostensibly covering technical issues. The technical material is limited to the basics of conducting reconnaissance, running Nmap, Nessus, CORE IMPACT, Ettercap, Aircrack-ng, Netcat for "maintaining access," SSH for an "encrypted tunnel," and trivial file and script changes to "cover tracks." Seriously. I'm sure some review readers are saying "sometimes it's just that easy." That's true, but we don't need a 528 page book with an outrageous price tag to read about these well-known methods. If your experience with pen testing is limited to this book, take a look at Andres Andreu's title to see the sort of material you should expect in a book on pen testing.
I didn't find the project management parts all that helpful, either. Some of it just repeats material published in various guides like the Open Source Security Testing Methodology Manual. Other sections repeat certification descriptions found on vendor Web sites. It is clear the author really cares about project management, so maybe he should have just written a book on project management for security managers?
I gave the book three stars because I didn't find the book to be technically or managerially incorrect. (If that had been the case, I would have rated it two stars.) If you want much better coverage on technical matters not found in Andreu's book, try the core Hacking Exposed titles. They address the same topics that PPT barely introduces.
For beginners, this text gives a very good overview of the entire penetration testing process from scoping all the way to writing an executive summary. For advanced testers, the most valuable sections are problaby the ones on testing frameworks, scoping, and report writing. I have met many testers who were excellent technically but could not communicate the results effectively to business leaders, this book will help these testers improve in that area. Advanced Pen Testers will probably not learn any technical tricks from this text.
My only complaint about the book is that it doesn't really go into how any of the exploits that one would use in pen testing work. For example, the author gives a listing of different NMAP scan options and very briefly goes over what the options are, but doesn't really explain why you would use one over the other. I am guessing that this omission is primarily due to the space required to add such information and the that the goal of the text seems to be to give the whole view of pen testing without going into too much deatil on any section.
The author definitely thought out all the ins and outs of writing up a contract with a client and many more legal ramifications that most companies focus on. That section is much marked up and will be kept for future reference.
I will admit I was a bit disappointed in part 2 as it clearly is directed toward beginners and not those with much experience. Overall, there is valuable information in this book and the material and extras on the CD are valuable. I think that it may have been more suitable to make this into two separate books.
The book has valuable knowledge, but the title is a bit misleading.
The next book on my list: Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques, from the same author.
I did like the down to earth explanations of what the reader should be seeing, etc.