The best defense is a good offense!

Ethical Hacking The Practical Guide for Pentesting and Red Teaming

written by
approx. $54.99

Pre-order now

approx. $59.95

Pre-order now

approx. $69.99

Pre-order now

Print edition E-book Bundle
850 pages, , Print edition paperback
ISBN 978-1-4932-2842-3
850 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2843-0
850 pages, , Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2844-7
Is your IT system truly secure? There’s only one way to find out: learn to think like a hacker and test it yourself! You’ll start by understanding how to find vulnerabilities through techniques like footprinting, scanning, enumeration, and fuzzing. Then you’ll discover how to exploit them—and importantly, how to protect against exploits—whether you’re dealing with brute-force attacks, cross-site scripting (XSS), SQL injection, social engineering, or any of the other threats out there. With integrated QR codes that connect you to supplemental video tutorials and hands-on exercises, this comprehensive guide will have you hacking in no time.
  • Get a deep dive into ethical hacking and professional pentesting
  • Learn key techniques: reconnaissance, scanning, enumeration, cryptography, and password cracking, and more
  • Create a hacking lab to simulate real threat scenarios and put theory into practice
About the E-book About the Book E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application. 850 pages, paperback. Including supplemental video tutorials. Reference book format 7 x 10 in. Printed black and white on 60# offset paper from sustainable sources. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout.

In this book, you'll learn about:

  1. The Hacking Lifecycle

    From reconnaissance and scanning to exploitation, privilege escalation, and report writing, walk through the phases of a professional penetration test. Understand the ethical and legal foundations of white hat hacking and pentesting.

  2. Models, Frameworks, and Standards

    Get a thorough grounding in information security models and frameworks such as MITRE ATT&CK and zero trust. Learn about professional pentesting standards like PTES, NIST, OWASP, and more.

  3. Hacking Challenges

    Test your skills with real-world scenarios! Gather intelligence through open-source research, exploit vulnerabilities such as XSS and SQL injection, perform password cracking and cryptographic analysis, and understand social engineering, malware, and covert communication.

Highlights include:

  • Footprinting
  • Scanning
  • Enumeration and fuzzing
  • Cryptography
  • Password cracking
  • Cross-site scripting (XSS)
  • SQL injection
  • Social engineering
  • Reverse shells
  • Malware
  • Metasploit
  • OWASP

Florian Dalwigk is an expert in cybercrime, cyberespionage, and IT security. After studying computer science, he worked for a security agency and has been a volunteer lecturer since 2024, teaching modules on "Ethical Hacking," "IT Forensics," "Cyberespionage," "Cybercrime and Crypto Forensics," and "Post-Quantum Cryptography," among others.

more >