![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
Ethical Hacking & Network Analysis with Wireshark
Publisher:
| Author:
| Language:
| Format:
Publisher:
Author:
Language:
Format:
₹899 ₹809
Save: 10%
In stock
Ships within:
In stock
ISBN:
Page Extent:
The ‘Ethical Hacker’s Penetration Testing Guide’ is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux.
A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts.
Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools.
The ‘Ethical Hacker’s Penetration Testing Guide’ is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux.
A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts.
Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools.
About Author
Reviews
There are no reviews yet.
Related products
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
RELATED PRODUCTS
Head First Java: A Brain-Friendly Guide, Third Edition
Save: 5%
Mastering Bitcoin: Programming the Open Blockchain, Second Edition
Save: 25%
Cryptography and Network Security (2nd Impression 2006)
Save: 60%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Linear Programming for Project Management Professionals 
Save: 10%
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Software Engineering A Practitioner’s Approach (7th Ed)
Save: 60%
The Big Score: The Billion Dollar Story Of Silicon Valley
Save: 25%
Reviews
There are no reviews yet.