Listen free for 30 days

  • Ethical Hacking

  • The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
  • By: Lester Evans
  • Narrated by: Brian R. Scott
  • Length: 3 hrs and 35 mins
  • Unabridged Audiobook
  • Categories: Computers & Technology, Computer Science
  • 2.5 out of 5 stars (4 ratings)

Listen with a free trial

One credit a month, good for any title to download and keep.
Unlimited listening to the Plus Catalogue - thousands of select Audible Originals, podcasts and audiobooks.
Exclusive member-only deals.
No commitment - cancel anytime.
Buy Now for £13.79

Buy Now for £13.79

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Summary

Ever feel like you don’t even own the hardware and software you paid dearly for? 

Ever get the impression that you have to ask for permission before installing or changing a program on your device? 

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? 

You’re not alone. 

Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning. 

There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you. 

In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place. 

Here’s just a tiny fraction of the topics covered in this audiobook: 

  • Fighting against companies
  • Ethical hacking defined
  • War on the internet
  • Engineer’s mind
  • The almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi and much, much more!

If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

©2019 Lester Evans (P)2019 Lester Evans

What listeners say about Ethical Hacking

Average customer ratings
Overall
  • 2.5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    2
Performance
  • 3.5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Story
  • 3 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
  • J
  • 13-03-19

Weird

I wanted a technical guide to ethical hacking not this bizarre libertarian manifesto. Don't waste your time with this.

1 person found this helpful

  • Overall
    1 out of 5 stars

Terrible

This book has nothing to do with penetration testing. Penetration testing is not mentioned once beyond the reading of the book name. There is nothing on improving cyber security. No tools are mentioned for pen testing, or for security management. Rather, such gems are offered as "Don't use Google calendar", "Copyright is evil" and "upload fake selfies to fool the social networks" - essentially this book is a collection of incorrect, vague and utterly one-sided musings on the world.

Sort by:
Filter by:
  • Overall
    2 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars
Profile Image for emilie
  • emilie
  • 08-04-19

Wrong title for this book

this is not a guide to pentesting nor ethical hacking. what they describe as ethical hacking is partly illegal and includes how to get around copyright laws. The book has a twist of conspiracy theory at times by describing international companies as machiavellian, although what they describe is likely true. it does describe how to stay low profile and get (partly) undetected by companies, with a view of big data platforms and algorithms as evil. not what I was looking for, unrelated to white hat ethical hacking, audit reviews and penetration testing.

5 people found this helpful

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
Profile Image for Anonymous User
  • Anonymous User
  • 13-03-19

No hacking examples

This book doesn’t go into hacking at all. It tells stories of super basic things that have happened and tells you what a torrent is at best. Things it considers good information are topics like, don’t use a simple password, people can get information off of Facebook, people can break into your WiFi, etc. total waste of time for anyone with even a shred of technical knowledge.

3 people found this helpful

  • Overall
    3 out of 5 stars
  • Performance
    2 out of 5 stars
  • Story
    3 out of 5 stars
Profile Image for Robert Leone
  • Robert Leone
  • 15-03-19

not what I expected but was decent

this book is for someone that may want to get into this kind of stuff and it almost hints at teaching you such things. although they teach you some things it's basically there to tell you why you would want to do this , how you can use it, and why you would. so if you are looking for a reason. this might be a good book. and also not know much of anything at all.

2 people found this helpful

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    2 out of 5 stars
Profile Image for Amazon Customer
  • Amazon Customer
  • 24-07-19

basic

Very basic and redundant. It was tough to finish only being 3 hours long. Will keep lookijg for the right one for me.

1 person found this helpful

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
Profile Image for Anonymous User
  • Anonymous User
  • 04-07-19

Bs propaganda

Couldnt get past 1 hr but maybe eventually he actually teaches something, instead of stroking his dick on how great it would be of he actually talked about something. Actual dogshit

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Randall Torrez
  • Randall Torrez
  • 11-02-19

Good book for a beginner

The most important part to me was he provided other information to find out more on pen testing. The last chapter on the penetration testing report on how important it is to the whole process.

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Silaoon Rome
  • Silaoon Rome
  • 11-02-19

A great on ramp for hackers.

Great book for the newbies, but also a nice resource for everybody that wants to know a structured, repeatable process to get going on network pen testing. Pat is the man!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Pamela
  • Pamela
  • 11-02-19

Excellent book

Amazingly clear, simply and straight forward. It helped me learn quite a bit about the basics. Would recommend to beginners.

1 person found this helpful

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars
Profile Image for Oldguy
  • Oldguy
  • 10-06-21

Waste of time is you watch the news and are skilled enough to use a smart phone.

Suitable for preteens.
There are no actual methods of hacking taught in this book. This book is about basic life skills to not get ripped off in life.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Debrah Sandra
  • Debrah Sandra
  • 11-02-19

Dated but worthwhile nontheless.

As someone who's new to penetration testing, but has been in the Info Sec field for a few years this book is a great resource! It walks you through setting up a pen testing lab and goes through various techniques in an easy to follow format.