Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing) cover art

Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

Preview
Get this deal Try Premium Plus free
Offer ends December 16, 2025 11:59pm GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

By: Gary Mitnick
Narrated by: Sean Tivenan
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends December 16, 2025 11:59pm GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

Only £0.99 a month for the first 3 months. Pay £0.99 for the first 3 months, and £8.99/month thereafter. Renews automatically. Terms apply. Start my membership

About this listen

Everything you need to know about ethical hacking.

Learn all the major hacking techniques today and how they work. By the time, you finish this book you will have strong knowledge of what a professional ethical hacker goes through. You will also be able to put these practices into action. There are five phases to penetration testing. These are important steps for any hacker to perform in order to successfully gain and maintain access. Properly performing the steps outlined in Hacking: A Concise Guide To Ethical Hacking, Everything You Need To Know can make the difference between a successful penetration or an unsuccessful one. Passive and active footprinting are discussed in detail and you will soon have some excellent footprinting tools available to you to use to complete the footprint.

Malware, Trojans, Viruses and worms are often specifically designed to gain access or damage systems without the knowledge of the victim. You will also learn about social engineering techniques, why they are so effective and get the social engineering toolkit to perform the job. Once the homework for the attack is complete the next step covered is the implementation of system hacking. Gain access with various password attacks, exploit weaknesses, get higher privileges and discover the tools that are used to hide a successful intrusion.

©2017 Gary Mitnick (P)2017 Gary Mitnick
Computer Science Programming Programming & Software Development Software Development Technology Hacking Computer Security Software
No reviews yet