The Cyberwarrior Handbook A Beginner's Guide to Hacking from Recon to Exploitation

by: Unknown

The Cyberwarrior Handbook A Beginner's Guide to Hacking from Recon to Exploitation

by: Unknown
  • ISBN 13:


  • ISBN 10:


  • Format: Paperback
  • Copyright: 02/07/2023
  • Publisher: No Starch Press

List Price $49.99 Save

Rent $44.54
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $49.99 Save $1.74

New $48.25

Usually Ships in 3-5 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.


Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools, techniques, and tricks from a veteran with 20 years experience in the field.

Hacking and cybersecurity are the most important skillsets of the 21st century. This thorough introduction by world-famous hacker OccupytheWeb teaches aspiring cyberwarriors the essential knowledge and tools they need to get started in the craft.

The book begins by showing readers how to set up a test lab with Kali Linux, the best operating system for hacking, and a Windows virtual environment for safely practicing techniques in real time. Each chapter focuses on a fundamental skill or method, like performing passive and active reconnaissance, cracking passwords, scanning for vulnerabilities with popular tools like nmap, spying on internet traffic with Wireshark, and using the Metasploit framework to exploit bugs and stealthily drop malicious payloads.

Learn how to evade or disable antivirus software, steal credentials, shred evidence by deleting logs, hijack WiFi signals, exact Denial of Service attacks, take over browsers or launch phishing campaigns using social-engineering techniques, and more.

Author Biography

Read more