search for books and compare prices
cover image
Hacker Methodology Handbook
The price is the lowest for any condition, which may be new or used; other conditions may also be available. Rental copies must be returned at the end of the designated period, and may involve a deposit.
Summaries and Reviews description: Product Description: This handbook is the perfect starting place for anyone who wants to jump into the world of penetration testing, but doesn't know where to start. This book covers every phase of the hacker methodology and what tools to use in each phase. These phases include recon, scanning and enumeration, exploitation, privileged escalation, persistence and data exfil. The tools covered in this book are all open source or already present on Windows and Linux system. Covered is the basics usage of the tools, examples, options used with the tools, as well as any notes about possible side effects of using a specific tool.

Pricing is shown for items sent to or within the U.S., excluding shipping and tax. Please consult the store to determine exact fees. No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. is not a bookseller, just an information source.