Your audiobook is waiting…

Ethical Hacking

The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
Narrated by: Brian R. Scott
Length: 3 hrs and 35 mins
4.5 out of 5 stars (27 ratings)

Regular price: $14.95

$14.95/month after 30 days. Cancel anytime.

Publisher's Summary

Ever feel like you don’t even own the hardware and software you paid dearly for? 

Ever get the impression that you have to ask for permission before installing or changing a program on your device? 

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? 

You’re not alone. 

Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning. 

There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you. 

In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place. 

Here’s just a tiny fraction of the topics covered in this audiobook: 

  • Fighting against companies
  • Ethical hacking defined
  • War on the internet
  • Engineer’s mind
  • The almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi and much, much more!

If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

©2019 Lester Evans (P)2019 Lester Evans

What members say

Average Customer Ratings

Overall

  • 4.5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    2
  • 1 Stars
    1

Performance

  • 4.5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    2
  • 1 Stars
    1

Story

  • 4.5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    2
  • 1 Stars
    1
Sort by:
  • Overall
    2 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

Wrong title for this book

this is not a guide to pentesting nor ethical hacking. what they describe as ethical hacking is partly illegal and includes how to get around copyright laws. The book has a twist of conspiracy theory at times by describing international companies as machiavellian, although what they describe is likely true. it does describe how to stay low profile and get (partly) undetected by companies, with a view of big data platforms and algorithms as evil. not what I was looking for, unrelated to white hat ethical hacking, audit reviews and penetration testing.

  • Overall
    3 out of 5 stars
  • Performance
    2 out of 5 stars
  • Story
    3 out of 5 stars

not what I expected but was decent

this book is for someone that may want to get into this kind of stuff and it almost hints at teaching you such things. although they teach you some things it's basically there to tell you why you would want to do this , how you can use it, and why you would. so if you are looking for a reason. this might be a good book. and also not know much of anything at all.

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars

No hacking examples

This book doesn’t go into hacking at all. It tells stories of super basic things that have happened and tells you what a torrent is at best. Things it considers good information are topics like, don’t use a simple password, people can get information off of Facebook, people can break into your WiFi, etc. total waste of time for anyone with even a shred of technical knowledge.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Dated but worthwhile nontheless.

As someone who's new to penetration testing, but has been in the Info Sec field for a few years this book is a great resource! It walks you through setting up a pen testing lab and goes through various techniques in an easy to follow format.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Good book enjoy it!

Each topic is very well explained for you to understand it. I find ir very useful. The book has a soft cover and the font of the paragraphs are very easy to understand.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Too Basic, still great work.

Yeah, I understand the title states it's the Beginner’s Guide but I believe it could cover more deeper the knowledge involved in the techniques. Knowing the underlying technologies is fundamental for understanding how to use the same techniques in different scenarios and hence having more sophisticated tests.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Good book for a beginner

The most important part to me was he provided other information to find out more on pen testing. The last chapter on the penetration testing report on how important it is to the whole process.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

A great on ramp for hackers.

Great book for the newbies, but also a nice resource for everybody that wants to know a structured, repeatable process to get going on network pen testing. Pat is the man!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Pamela
  • West Palm Beach
  • 02-11-19

Excellent book

Amazingly clear, simply and straight forward. It helped me learn quite a bit about the basics. Would recommend to beginners.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Added to my digital bookshelf

This book is definitely worth having. I have picked up many tricks from reading this book. I recommend it to those who want to know more about penetration testing.

Sort by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
  • J
  • 03-13-19

Weird

I wanted a technical guide to ethical hacking not this bizarre libertarian manifesto. Don't waste your time with this.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Cotham Mark
  • 02-11-19

Great book, got me hooked on pentesting

Overall an excellent book for anyone looking to get into security and pentesting and one I would highly recommend.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Mark Ashton
  • 02-11-19

Very easy to read and follow

This reference is outstanding. It is super easy to read and super easy to follow, even for beginners. Concepts are clearly explained with word illustrations used to help drive the points home. What I really appreciate about this book is that it is set up in the chronological order that you would use when carrying out a pen test. While an experienced person might find this volume basic it gives an outstanding foundation to build from, especially if you're just starting out in this field.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Marie Antoinette
  • 02-10-19

Great read about Ethical Hacking.

As someone looking to get more into computer and network security, I found this be a great read. The author did a wonderful job covering each of the penetration testing steps and presented each in a way that I found easy to follow along and understand. Unlike other books, this book is not just theory and best practices. Lester Evans actually walks you through each of the tools and shows you how to use them. Although he does not cover each tool in depth, he does tell you where to go to find that information if you are looking for it. I would certainly recommend this book if you are looking to get into offensive security/penetration testing.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Alisha Ward
  • 02-10-19

"How to" on basic Ethical Hacking

The book is very readable compared to other technical books. The writer is clearly a teacher who understands how to keep a reader's attention while providing useful, real world information. As of now, this book seems very up-to-date. It as published recently and has what I have read in other resources are commonly used tools in the industry.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Jasmine Norton
  • 02-10-19

Interesting, Informative, and Brief

This book is a very interesting and informative read. I followed all of the steps almost verbatim and everything worked as written. The contents of the book have already been reviewed, and I don't find it necessary to regurgitate. I agree with the good reviews, this book rocks.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Imogen Poole
  • 02-10-19

The Basics of Ethical Hacking.

Arrived quickly and in like new condition. It provides me with lots to learn as I attempt to secure my small home network and learn whatever there is to learn on my limited disabled budget. this is an incredibly interesting topic.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Courtney Phillips
  • 02-10-19

starsMy favorite so far!

Great book. I've been reading quite a few books on the subject lately, and so far this one has been the most comprehensive and informative of the lot.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Ilias de Rooij
  • 02-10-19

The first in penetration baby steps

This book has turned out to be the most beneficial book so far in my education. It's filled with the baby steps needed for penetration testing. This has given me enough knowledge to seek other reference material to continue along this track.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Rhys Wallace
  • 02-10-19

The book is a good on hacking.

The book is a good overall start for becoming a hacker / pen tester from start to finish. The author tells you about parts so that if you want to go further and try to start your own pen testing company, you'll have a better idea on what is necessary to get and keep clients coming back.