Penetration Tester's Open Source Toolkit and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Penetration Tester's Open Source Toolkit on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Penetration Tester's Open Source Toolkit [Paperback]

Jeremy Faircloth
3.0 out of 5 stars  See all reviews (1 customer review)
RRP: 30.99
Price: 21.07 & FREE Delivery in the UK. Details
You Save: 9.92 (32%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 14 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 1 Sept.? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 20.02  
Paperback 21.07  

Book Description

9 Dec 2011 1597496278 978-1597496278 3
Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. "Penetration Tester's Open Source Toolkit, Third Edition", expands upon existing instructions so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This title details current open source penetration testing tools. It presents core technologies for each type of testing and the best tools for the job. New to this edition includes: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.

Frequently Bought Together

Penetration Tester's Open Source Toolkit + Metasploit: The Penetration Tester's Guide
Buy the selected items together

Product details

  • Paperback: 400 pages
  • Publisher: Syngress; 3 edition (9 Dec 2011)
  • Language: English
  • ISBN-10: 1597496278
  • ISBN-13: 978-1597496278
  • Product Dimensions: 23.1 x 19 x 3 cm
  • Average Customer Review: 3.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 848,655 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Product Description


"This book is relevant for a community of hackers (in the positive sense hopefully) or technical auditors. The author, Jeremy Faircloth, is a Sr. Manager/Solutions Architect for Best Buy where, with his team, he architects and maintains enterprise-wide client/server and Web-based technologies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals. He is an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications and project management. The author is also co-author to several technical books covering a variety of topics. The author presents in this book a kind of toolbox that can help to test systems' resiliency to penetration actions and thus revealing any exploitable vulnerabilities. The elements presented in this book should enable the design of a penetration tests laboratory."--Computers and Security "Readers would find a rich collection of tools here. Those with a background in this area would find the collection of tool usage and reviews helpful and would benefit from this as a resource." "Jeremy Faircloth continues to write about computer and network security in ways that help the InfoSec community. In Penetration Tester's Open Source Toolkit, Third Edition he combines his sharp insight into a wide variety of technologies, diverse penetration testing approaches and several penetration testing tools (then showcases these tools in action in the case study in each chapter) so the student of penetration testing can go out and get it done. This is just the kind of writing we should be expecting from our front runners in IT to be doing to support our Enterprise."--Tim Hoffman, President, Alida Connection "All in all Penetration Tester's Open Source Toolkit is a good read. Clear, concise and made me want to put to work the knowledge I had learnt at the end of each chapter so that I could say, yes I do understand how that works and how to use it in future tests."--review on "Intended for new and experienced penetration testers as well as database administrators, system architects, and others involved in security design, this guide to open source tools provides detailed practical information on freely available applications for security testing. Beginning with an overview of general tools, the work covers reconnaissance and scanning, client side attacks, database hacking, web and web application vulnerabilities, wireless penetration and building customized testing and penetration 'labs.' The volume includes numerous screenshots, illustrations, and code examples as well as information on where to collect the open source applications discussed in the work."--SciTech Book News "My first impression about this book was that it was loaded with information! The book is well organized and systematically walks you through the art/science of penetration testing. The language used is easy to understand and if you look at each chapter, the book is organized in a certain fashion. Each chapter starts with an objectives section and the approach taken, followed by a concise discussion on the core technologies and various helpful Open Source tools. The last section before the summary is dedicated to a case study, which helps tie together all the information from that chapter. One element of the book that really stood out for me was the Hands-on challenge section. It really lifts the book from a passive reading source to a more practical guide and prompts the reader to experiment with a few things."--PenTest Magazine "As mentioned earlier, this book is a treasure of open source tools, but what I would have loved to see is a "cheatsheet" of all the tools mentioned. One of the biggest takeaways for me from the book is the importance of getting comfortable with open source tools, such as Backtrack suite and Metasploit. Knowledge of python can be an added advantage, especially if you intend to modify the existing script."--PenTest Online

About the Author

Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a "Renaissance man of IT with over 20 years of real-world IT experience, he has become an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

5 star
4 star
2 star
1 star
3.0 out of 5 stars
3.0 out of 5 stars
Most Helpful Customer Reviews
3.0 out of 5 stars Pen Testers - Look here! 2 July 2012
The tools of the penetration testing trade are subject to increasing interest. Shelves are lined with books on testing and hacking tools that are all sold as "must have". This book is an addition to this category and brings the focus on open source tools available for instant and customisable deployment.

The authors offer a simple and linear structure to the book: The opening chapter lays down some practical advice on bootable mediums to get started with tools. The following eight chapters tackle network services, databases, web applications, wireless networks and so on. The chapters provide ample illustrations of configuration and output. The book concludes on a chapter dedicated to building a penetration testing lab, which loses focuses as the reader is thrown to and forth between virtualisation and network basics.

Readers would find a rich collection of tools here. Beyond that I doubt this book adds much value. There seems to be no strategy to a systematic build up towards a skill set that the tools covered here provide for. Some half the book seems to revolve around nmap. The book is sprinkled with "tip", "note", "warning" and "epic fail" boxes at times with no justification and no reason why the advice should be part of the main text. Neither is there any attempt at any overarching case study to guide a hands-on reader. I am somewhat disappointed.

I would like to recommend that readers approach with caution. Those with a background in this area would find the collection of tool usage and reviews helpful, and would benefit from this as a resource. Those new to the area, or wanting to build up a better conceptual view of the area, would benefit from looking around on the shelves. I would not recommend this book to academic practitioners or students.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 4.4 out of 5 stars  5 reviews
1 of 1 people found the following review helpful
5.0 out of 5 stars Good book for hacking 8 Jan 2014
By Darin D - Published on
Format:Paperback|Verified Purchase
Good book. Good examples and how toos. This book lays out all the steps to do a pen test for anyone with IT experience. This book is not for a beginner. You will need a year or two of REAL experience.
2.0 out of 5 stars An OK read with some useful tips and tools covered. 25 Jun 2014
By Tapper - Published on
Format:Kindle Edition|Verified Purchase
This book is an OK read with some useful methods.

Might act as a useful reference but no more than that.
5 of 8 people found the following review helpful
5.0 out of 5 stars Good Book 2 Jan 2013
By Dan - Published on
Format:Paperback|Verified Purchase
Lots of info for someone just starting out. Easy to read and understand. Worth the money. Four More Words Needed for review :)
0 of 1 people found the following review helpful
5.0 out of 5 stars Great introduction to the field of pen testing 20 Feb 2014
By Your Pc Surgeon - Published on
Format:Paperback|Verified Purchase
Ever so increasing threads against security of the networks brought the necessity of testing them against intrusions.
The book makes excellent "first step" approach for IT techs or more advanced computer users to see if they would like
to add pen testing to their services. In the same time stressing over and over again it is a field with growing demand, but
avoiding guiding those that want to just "hack" other networks.
It is a "two-edged sword", but I am glad author was willing to share his knowledge in this book.
1 of 8 people found the following review helpful
5.0 out of 5 stars Prompt delivery 12 Mar 2013
By DT - Published on
Format:Paperback|Verified Purchase
Book came really quick, and I needed it for my class. No complaints at all, other that I am yet to use it for class.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category