BeginnerPentestingOffensiveTooling

Penetration Testing

A Hands-On Introduction to Hacking

4 / 5

Georgia Weidman's lab-driven introduction to pentesting, walking the reader from setting up a target environment through scanning, exploitation, post-exploitation, and reporting.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2014
Publisher
No Starch Press
Pages
528
Language
English

Read this if

Beginners who want a single hands-on intro that walks them through a complete pentest workflow: lab setup, recon, exploitation, post-exploitation, reporting. Still the friendliest entry point in print.

Skip this if

Readers who already work in offensive security or want current-decade tooling specifics. The edition is dated against modern Active Directory tradecraft and EDR realities; the workflow is timeless, the tools are not.

Key takeaways

  • A complete pentest is a small number of repeated motions (recon, find foothold, escalate, pivot, document); Weidman teaches the rhythm before the tooling.
  • Lab setup is half the learning; running through the book's Metasploitable-and-Windows-VM lab is what builds the muscle memory the OSCP later assumes.
  • Reporting matters as much as exploitation; the book is one of the few intro texts that takes the deliverable seriously.

Notes

The OSCP-prep community still recommends this book first, despite its age, because nothing has replaced it for newcomers. Pair with Hacking: The Art of Exploitation for the binary side and PortSwigger Academy for current web. Weidman is also a strong public speaker (her DEF CON talks on smartphone botnets and Shevirah are worth watching). Buy the older edition cheap; the workflow taught is what you're paying for.