{"id":25280,"date":"2023-09-07T18:33:19","date_gmt":"2023-09-07T13:03:19","guid":{"rendered":"https:\/\/www.guvi.in\/blog\/?post_type=web-story&#038;p=25280"},"modified":"2023-09-07T18:33:21","modified_gmt":"2023-09-07T13:03:21","slug":"top-10-ethical-hacking-books-you-should-read","status":"publish","type":"web-story","link":"https:\/\/www.guvi.in\/blog\/web-stories\/top-10-ethical-hacking-books-you-should-read\/","title":{"rendered":"Top 10  Ethical Hacking Books You Should Read!"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40400%3B700\" rel=\"stylesheet\"\/><link href=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1.png\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-captions span {\n                display: inline-block;\n                margin: 0;\n                padding: 6px 12px;\n                vertical-align: middle;\n                border-radius: 15px;\n                background: rgba(11, 11, 11, 0.6);\n                color: rgba(255, 255, 255, 1);\n                font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Oxygen-Sans, Ubuntu, Cantarell, \"Helvetica Neue\", sans-serif;;\n                font-size: calc(4 * var(--story-page-vw));\n                line-height: 1.4;\n                word-break: break-word;\n                word-wrap: break-word;\n                overflow-wrap: break-word;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Top 10  Ethical Hacking Books You Should Read!<\/title><link rel=\"canonical\" href=\"https:\/\/www.guvi.in\/blog\/web-stories\/top-10-ethical-hacking-books-you-should-read\/\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"GUVI Blogs\" publisher-logo-src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2021\/03\/cropped-cropped-cropped-20210111091003159396O4KG1V112112pngcompguviwebsitemoengage-1.png\" title=\"Top 10  Ethical Hacking Books You Should Read!\" poster-portrait-src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/cropped-Top-10-Ethical-Hacking-Books-You-Should-Read-2.png\"><amp-story-page id=\"1925fb65-82c0-4836-b6ee-59871f898dbf\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#cc7b52\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-6be8def5-02c3-4cd4-8796-d1d6ae2650b0\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1.png\" alt=\"Top 10 Ethical Hacking Books You Should Read!\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1.png 2160w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-1152x2048.png 1152w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-150x267.png 150w\" sizes=\"(min-width: 1024px) 46vh, 103vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:17.71845%;top:16.01942%;width:67.23301%;height:27.6699%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7220216606498195% 0.7220216606498195% 0.7220216606498195% 0.7220216606498195% \/ 1.1695906432748537% 1.1695906432748537% 1.1695906432748537% 1.1695906432748537%\" id=\"el-7525557a-43cb-4a90-8d10-7b2e175954e3\">\n<h1 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11777978339350113% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Top 10&nbsp;<\/span><br \/>\n<span style=\"font-weight: 700; color: #fff\">Ethical Hacking Books You Should Read!<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:17.47573%;top:9.87055%;width:52.42718%;height:4.04531%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.9259259259259258% 0.9259259259259258% 0.9259259259259258% 0.9259259259259258% \/ 8% 8% 8% 8%\" id=\"el-301f14d3-6c34-4578-94fe-aeb29d48c498\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1406250000000004% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.349515em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Beginner to Advanced<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"3ede0d32-1f6a-4acf-ab06-8879492ed0a1\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-273272d7-9084-46d6-b508-c3bc43cf61ff\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-526ce8e0-0fc0-4ac2-b15f-57db2d44658e\",\"keyframes\":{\"transform\":[\"translate3d(121.60280%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-7308b2cc-7239-4848-848f-690d63e10499\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-0982ba26-e4a5-4979-9c34-d605cdc88483\",\"keyframes\":{\"transform\":[\"translate3d(127.27274%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bbcbd4\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e3a69e12-8ca5-42df-9ac1-348c51831022\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing.png\" alt=\"Basics of Hacking &amp; Penetration Testing\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:15.29126%;top:4.20712%;width:69.66019%;height:10.35599%;opacity:1\">\n<div id=\"anim-273272d7-9084-46d6-b508-c3bc43cf61ff\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-526ce8e0-0fc0-4ac2-b15f-57db2d44658e\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(121.60280%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6968641114982579% 0.6968641114982579% 0.6968641114982579% 0.6968641114982579% \/ 3.125% 3.125% 3.125% 3.125%\" id=\"el-c2994e35-2980-4691-9fa5-8d659becc308\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13229529616724714% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Basics of Hacking &amp; Penetration Testing<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:15.04854%;top:17.31392%;width:66.74757%;height:27.99353%;opacity:1\">\n<div id=\"anim-7308b2cc-7239-4848-848f-690d63e10499\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-0982ba26-e4a5-4979-9c34-d605cdc88483\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(127.27274%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.1560693641618496% 1.1560693641618496% 1.1560693641618496% 1.1560693641618496%\" id=\"el-a956db0a-56a7-402c-8311-20030eda0cc7\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Patrick Engebretson, this book dives deep into the tools and processes used by penetration testers to gain access to the systems. The book is apt for freshers who are infosec professionals &amp; security consultants.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"b0e19391-f8ef-42d6-9143-c5857efa8c42\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-26c13973-392f-4532-bff5-af5c518897a3\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-46c9c24f-0e7e-4fd1-af7c-ed80507c0cb2\",\"keyframes\":{\"transform\":[\"translate3d(118.27243%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-fb776d65-ad9e-413a-855c-7264e76fe40c\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-7d0fb4a5-48a9-4818-9c88-6f698e86c8a7\",\"keyframes\":{\"transform\":[\"translate3d(129.81819%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bbcad4\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-117d7530-de6c-4e7c-921a-410fab96fddc\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_.png\" alt=\"Hacking- Beginner\u2019s Guide to Computer Hacking, Basic Security, Penetration Testing_\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:3.55987%;width:73.05825%;height:20.87379%;opacity:1\">\n<div id=\"anim-26c13973-392f-4532-bff5-af5c518897a3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-46c9c24f-0e7e-4fd1-af7c-ed80507c0cb2\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(118.27243%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6644518272425249% 0.6644518272425249% 0.6644518272425249% 0.6644518272425249% \/ 1.550387596899225% 1.550387596899225% 1.550387596899225% 1.550387596899225%\" id=\"el-c3c3e40b-3557-4bbb-9aa8-7c0694cfd314\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12614202657807286% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Hacking: Beginner\u2019s Guide to Computer H<\/span><span style=\"font-weight: 700\">acking, Basic Security, Penetration Testing&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:27.18447%;width:66.74757%;height:17.31392%;opacity:1\">\n<div id=\"anim-fb776d65-ad9e-413a-855c-7264e76fe40c\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-7d0fb4a5-48a9-4818-9c88-6f698e86c8a7\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(129.81819%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.8691588785046727% 1.8691588785046727% 1.8691588785046727% 1.8691588785046727%\" id=\"el-ea73c9dc-dfab-4a1d-8b75-f8f057325b15\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by John Stark, This book is about the history of hacking types, various types of hacking attacks, basic hacking tools and software, and hiding IP addresses.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"d63c14c8-bebb-4dc8-8af0-3a5470b58e69\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-0bb1fda2-a10a-4288-8dfd-f4b33325f941\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-9787f9cf-05d1-4a3a-b2d0-a193904c534f\",\"keyframes\":{\"transform\":[\"translate3d(115.96092%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-5e6a87b0-e1f6-4906-9339-78ecdb0e0cd3\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-fa5a2d24-eafb-4694-8a65-ef83b549318f\",\"keyframes\":{\"transform\":[\"translate3d(129.45456%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bacbd4\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-ce22154c-6e67-4e47-8072-4cc5741f65bd\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation.png\" alt=\"Hacking- The art of exploitation\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:6.31068%;width:74.51456%;height:10.35599%;opacity:1\">\n<div id=\"anim-0bb1fda2-a10a-4288-8dfd-f4b33325f941\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-9787f9cf-05d1-4a3a-b2d0-a193904c534f\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.96092%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 3.125% 3.125% 3.125% 3.125%\" id=\"el-42de6d09-f200-455f-b9bd-860468045a3a\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Hacking: The art of exploitation<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:19.09385%;width:66.74757%;height:27.99353%;opacity:1\">\n<div id=\"anim-5e6a87b0-e1f6-4906-9339-78ecdb0e0cd3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-fa5a2d24-eafb-4694-8a65-ef83b549318f\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(129.45456%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.1560693641618496% 1.1560693641618496% 1.1560693641618496% 1.1560693641618496%\" id=\"el-aa031297-285f-4178-8f52-9d3e14091ae2\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Jon Erickson, This book helps you understand how to develop exploits rather than just using them. This book is a must-read, if you wish to level up your ethical hacking game. It mainly focuses on network security &amp; computer security. .<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"131aa334-72de-4ca4-9e59-cee276ab2be7\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-3d3d2ee0-44e5-4b2a-9212-81af9ceb3901\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-ce519ead-b4a0-4e04-947b-d631a3a55473\",\"keyframes\":{\"transform\":[\"translate3d(115.96092%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-551521e3-e983-4fb1-997e-2b7cc9c34d85\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-b6380819-5bda-48a1-a0ca-72e51e05d8ff\",\"keyframes\":{\"transform\":[\"translate3d(129.45456%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bccfda\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0ffbcf69-f983-4008-ae9d-8d95b6e3ff4f\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook.png\" alt=\"Kali Linux \u2013 An Ethical Hacker\u2019s Cookbook\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-%E2%80%93-An-Ethical-Hackers-Cookbook-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:6.31068%;width:74.51456%;height:10.35599%;opacity:1\">\n<div id=\"anim-3d3d2ee0-44e5-4b2a-9212-81af9ceb3901\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-ce519ead-b4a0-4e04-947b-d631a3a55473\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.96092%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 3.125% 3.125% 3.125% 3.125%\" id=\"el-8dfb3c5e-86bd-48a8-b179-d7380094407c\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Kali Linux \u2013 An Ethical Hacker\u2019s Cookbook<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:19.09385%;width:66.74757%;height:24.43366%;opacity:1\">\n<div id=\"anim-551521e3-e983-4fb1-997e-2b7cc9c34d85\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-b6380819-5bda-48a1-a0ca-72e51e05d8ff\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(129.45456%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.3245033112582782% 1.3245033112582782% 1.3245033112582782% 1.3245033112582782%\" id=\"el-e4a3db16-cd1a-4429-abb6-90b436d8e604\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Himanshu Sharma, this book will help you get started with the installation &amp; configuration of Kali Linux. You will also be acquainted with conducting advanced penetration testing &amp; performing network exploitation.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"d37372c2-6e69-4a07-beb7-d46147e47e96\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-c0fa3086-d963-4b03-af79-910dac156a39\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-f8bf09fc-c105-44f1-b555-8cc62aebbabf\",\"keyframes\":{\"transform\":[\"translate3d(115.96092%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-b401fa03-56f3-4f78-810d-7b12f4a77389\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-b4d0e114-b1d3-4e2b-81df-0fccc408d25e\",\"keyframes\":{\"transform\":[\"translate3d(116.33988%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bbccd6\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-d8554294-e3f6-4cc7-88fc-eb6878adfd03\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide.png\" alt=\"Metasploit- The Penetration Tester\u2019s Guide\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:2.75081%;width:74.51456%;height:15.53398%;opacity:1\">\n<div id=\"anim-c0fa3086-d963-4b03-af79-910dac156a39\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-f8bf09fc-c105-44f1-b555-8cc62aebbabf\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.96092%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 2.083333333333333% 2.083333333333333% 2.083333333333333% 2.083333333333333%\" id=\"el-5b7b0765-ac6a-4002-ad72-12c65586f6c1\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Metasploit: The Penetration Tester\u2019s Guide<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:22.65372%;width:74.27184%;height:20.87379%;opacity:1\">\n<div id=\"anim-b401fa03-56f3-4f78-810d-7b12f4a77389\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-b4d0e114-b1d3-4e2b-81df-0fccc408d25e\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(116.33988%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6535947712418301% 0.6535947712418301% 0.6535947712418301% 0.6535947712418301% \/ 1.550387596899225% 1.550387596899225% 1.550387596899225% 1.550387596899225%\" id=\"el-383a8b2d-4308-49d6-9ba7-d8bb6a3a8f10\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.08272058823529377% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by authors: David Kennedy, Jim O\u2019Gorman, Devon Kearns, &amp; Mati Aharoni, this book will teach you all about the Metasploit framework, a powerful tool for hackers to exploit IP addresses and ports in it.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"c18117cb-9c4d-4db8-97c7-1f98b1b08b13\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-4c2325c0-7d0b-444b-b3ab-2116ba664a11\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-b2704637-a6bf-482b-a539-14562b124923\",\"keyframes\":{\"transform\":[\"translate3d(116.28666%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bacbd4\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-9c767d22-5cf7-4ad9-b2c7-7f6f06d83789\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking.png\" alt=\"Penetration Testing- A Hands-On Introduction to Hacking\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:2.75081%;width:74.51456%;height:15.53398%;opacity:1\">\n<div id=\"anim-4c2325c0-7d0b-444b-b3ab-2116ba664a11\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-b2704637-a6bf-482b-a539-14562b124923\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(116.28666%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 2.083333333333333% 2.083333333333333% 2.083333333333333% 2.083333333333333%\" id=\"el-c55e9f68-0474-440e-a23d-6cc6717e9991\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Penetration Testing: A Hands-On Introduction to Hacking<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:20.87379%;width:66.74757%;height:24.43366%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.3245033112582782% 1.3245033112582782% 1.3245033112582782% 1.3245033112582782%\" id=\"el-81eba2b5-ed07-4324-a6ff-b0a6e1db3da5\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Georgia Weidman, this book focuses on the core skills &amp; techniques of penetration testing. You\u2019ll also learn the prime stages of an actual assessment: gathering information, unraveling vulnerabilities &amp; so on.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"975a8994-e216-45a1-af6b-e5f0282604c3\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-e69b3383-a2cc-459f-a0ee-feb1fda0deee\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-58551f2d-a621-4d11-93a2-6f81c68fadc4\",\"keyframes\":{\"transform\":[\"translate3d(116.28666%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-1a3a8a1a-75df-4e95-9491-a9d10e819c07\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-8a50529e-5b8a-429c-9b68-445cc8541ed0\",\"keyframes\":{\"transform\":[\"translate3d(115.58442%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":600,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bccfd9\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-d01ec752-403c-4aca-90d2-3294ac1def91\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing.png\" alt=\"The Hacker Playbook 3- Practical Guide to Penetration Testing\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:5.33981%;width:74.51456%;height:15.53398%;opacity:1\">\n<div id=\"anim-e69b3383-a2cc-459f-a0ee-feb1fda0deee\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-58551f2d-a621-4d11-93a2-6f81c68fadc4\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(116.28666%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 2.083333333333333% 2.083333333333333% 2.083333333333333% 2.083333333333333%\" id=\"el-d60e8235-87a1-4014-a250-c9cd2dce93ff\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">The Hacker Playbook 3: Practical Guide to Penetration Testing<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:23.46278%;width:74.75728%;height:20.87379%;opacity:1\">\n<div id=\"anim-1a3a8a1a-75df-4e95-9491-a9d10e819c07\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-8a50529e-5b8a-429c-9b68-445cc8541ed0\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.58442%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6493506493506493% 0.6493506493506493% 0.6493506493506493% 0.6493506493506493% \/ 1.550387596899225% 1.550387596899225% 1.550387596899225% 1.550387596899225%\" id=\"el-882974fc-0d4c-457b-b9e6-d057c8f2e96b\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.08218344155844122% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Peter Kim, This book focuses on real-world attack exploitation, custom malware persistence,&amp; more. It will help you advance your offensive hacking skills &amp; attack parts. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"0ce82065-5cb1-45dc-b458-51c25f8026b7\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-88727825-4293-4c0e-8aec-1edaa8fdad08\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-6ff82a84-9959-492f-90fc-d1a6d029bdb5\",\"keyframes\":{\"transform\":[\"translate3d(116.28666%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-11f81558-7d38-496c-aa1f-4c2f7954a8a4\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-4dfa65c4-5646-45b5-8df4-ce16db9e77e2\",\"keyframes\":{\"transform\":[\"translate3d(129.45456%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#6e4e3a\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e2546892-ae9d-4868-b186-7dece9006ce4\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters.png\" alt=\"Black Hat Python- Python Programming for Hackers &amp; Pentesters\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:8.57605%;width:74.51456%;height:15.53398%;opacity:1\">\n<div id=\"anim-88727825-4293-4c0e-8aec-1edaa8fdad08\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-6ff82a84-9959-492f-90fc-d1a6d029bdb5\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(116.28666%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 2.083333333333333% 2.083333333333333% 2.083333333333333% 2.083333333333333%\" id=\"el-5fcba651-fd59-4c2f-8d9f-cb0361247ecf\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Black Hat Python: Python Programming for Hackers &amp; Pentesters<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.59223%;top:26.69903%;width:66.74757%;height:20.87379%;opacity:1\">\n<div id=\"anim-11f81558-7d38-496c-aa1f-4c2f7954a8a4\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-4dfa65c4-5646-45b5-8df4-ce16db9e77e2\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(129.45456%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7272727272727273% 0.7272727272727273% 0.7272727272727273% 0.7272727272727273% \/ 1.550387596899225% 1.550387596899225% 1.550387596899225% 1.550387596899225%\" id=\"el-08238801-041e-4f8d-bc5b-019ef73eb387\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09204545454545415% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Justin Seitz, this book covers the darker side of Python\u2019s capabilities like infecting virtual machines, writing network sniffers, creating trojans, etc. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"da6b01a8-6161-44d8-81ed-70b06f2bed6a\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-75a3bcaa-693c-4098-92a4-75442dbddfde\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-cea8080a-55da-4968-9b46-6b863d4d5ca3\",\"keyframes\":{\"transform\":[\"translate3d(116.28666%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-4f8c00a9-b70a-4b96-9791-64a05cf6771a\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-f2fcb451-d9f0-42ee-abd2-d1c2767a462a\",\"keyframes\":{\"transform\":[\"translate3d(115.85760%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bacad3\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-388b075a-f6f8-4b68-b791-d05d0ac50c08\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws.png\" alt=\"the web application hacker\u2019s handbook- Finding and Exploiting Security Flaws\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.34951%;top:2.589%;width:74.51456%;height:20.71197%;opacity:1\">\n<div id=\"anim-75a3bcaa-693c-4098-92a4-75442dbddfde\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-cea8080a-55da-4968-9b46-6b863d4d5ca3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(116.28666%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 1.5625% 1.5625% 1.5625% 1.5625%\" id=\"el-7d090581-4f7e-4646-ae3c-49c448019be5\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">The Web Application Hacker\u2019s Handbook: Finding and Exploiting Security Flaws<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.1068%;top:29.12621%;width:75%;height:17.31392%;opacity:1\">\n<div id=\"anim-4f8c00a9-b70a-4b96-9791-64a05cf6771a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-f2fcb451-d9f0-42ee-abd2-d1c2767a462a\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.85760%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6472491909385114% 0.6472491909385114% 0.6472491909385114% 0.6472491909385114% \/ 1.8691588785046727% 1.8691588785046727% 1.8691588785046727% 1.8691588785046727%\" id=\"el-e9c66358-ad04-4718-9e95-3e425e0408f3\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.081917475728155% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Dafydd Stuttard &amp; Marcus Pinto, The updated edition focuses on updated web applications, exposing them to attacks and executing fraudulent transactions.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"6afb4ac8-0a51-491a-aaaf-76a8a9aaf3ee\" auto-advance-after=\"7s\"><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-1f1b2033-b33c-41fe-aec3-ca32965224f3\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-7c669db6-7b54-44ba-bd97-aa7ce97517c6\",\"keyframes\":{\"transform\":[\"translate3d(115.63519%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-9e57bb54-aafa-4027-b7df-29cb3f9cb2ae\",\"keyframes\":{\"opacity\":[0,1]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-animation layout=\"nodisplay\" trigger=\"visibility\"><script type=\"application\/json\">[{\"selector\":\"#anim-9bd20776-a345-4750-b0ff-01a75fc9bb3e\",\"keyframes\":{\"transform\":[\"translate3d(115.48386%, 0px, 0)\",\"translate3d(0px, 0px, 0)\"]},\"delay\":0,\"duration\":2000,\"easing\":\"cubic-bezier(0.2, 0.6, 0.0, 1)\",\"fill\":\"both\"}]<\/script><\/amp-story-animation><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#bcccd5\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-3fc1b2f0-c20b-4ac3-b5a4-af88c4b20a39\">\n<div style=\"position:absolute;width:100%;height:100%;left:0%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast.png\" alt=\"Web Security Testing Cookbook- Systematic Techniques to Find Problems Fast\" srcSet=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast.png 1080w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-864x1536.png 864w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-768x1365.png 768w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-576x1024.png 576w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-169x300.png 169w,https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-150x267.png 150w\" sizes=\"(min-width: 1024px) 47vh, 104vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:13.83495%;top:0;width:74.51456%;height:20.71197%;opacity:1\">\n<div id=\"anim-1f1b2033-b33c-41fe-aec3-ca32965224f3\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-7c669db6-7b54-44ba-bd97-aa7ce97517c6\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.63519%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6514657980456027% 0.6514657980456027% 0.6514657980456027% 0.6514657980456027% \/ 1.5625% 1.5625% 1.5625% 1.5625%\" id=\"el-677fe6fc-a843-4367-b0bf-08e31dd4814e\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12367671009771963% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700\">Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:13.1068%;top:24.91909%;width:75.24272%;height:20.87379%;opacity:1\">\n<div id=\"anim-9e57bb54-aafa-4027-b7df-29cb3f9cb2ae\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:0;--initial-transform:none\">\n<div id=\"anim-9bd20776-a345-4750-b0ff-01a75fc9bb3e\" class=\"animation-wrapper\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0;--initial-opacity:1;--initial-transform:translate3d(115.48386%, 0px, 0)\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6451612903225806% 0.6451612903225806% 0.6451612903225806% 0.6451612903225806% \/ 1.550387596899225% 1.550387596899225% 1.550387596899225% 1.550387596899225%\" id=\"el-ea645190-6cfe-448f-a197-0a84d2ad8042\">\n<p class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.08165322580645128% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.291262em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span>Written by Paco Hope &amp; &nbsp;Ben Walther, This book teaches you how to check for the most common web security issues, it also acquaints you with installing and configuring free &amp; good security testing tools.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"71dae96b-fcff-4782-8d12-b65fa3a4f1c8\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#fff\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-c98d69ca-9d19-42e2-881d-4e3f5420f6bc\">\n<div class=\"fill\" style=\"will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.54693%;width:100%;height:120.38835%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-9e9559a2-adc9-4d6f-bb01-efb6f0914c60\">\n<div class=\"fill\" style=\"background-color:#0f1724;will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:15.7767%;top:36.08414%;width:68.93204%;height:15.69579%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7042253521126761% 0.7042253521126761% 0.7042253521126761% 0.7042253521126761% \/ 2.0618556701030926% 2.0618556701030926% 2.0618556701030926% 2.0618556701030926%\" id=\"el-dff98f07-7153-4ac9-b797-a12677e6faa3\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1336927816901406% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.436893em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Want to dive deeper into the world of Ethical Hacking?&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:30.82524%;top:57.44337%;width:38.83495%;height:7.44337%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:3.125% 3.125% 3.125% 3.125% \/ 10.869565217391305% 10.869565217391305% 10.869565217391305% 10.869565217391305%\" class=\"mask\" id=\"el-3af58872-997b-4292-a2ca-8fdf027db653\">\n<div class=\"fill\" style=\"background-color:#0b963d;will-change:transform\"><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:36.65049%;top:59.06149%;width:26.94175%;height:4.04531%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:1.8018018018018018% 1.8018018018018018% 1.8018018018018018% 1.8018018018018018% \/ 8% 8% 8% 8%\" id=\"el-2b909c3f-f2ce-4915-929b-1ffbd6739677\"><a href=\"https:\/\/www.guvi.in\/blog\/best-ethical-hacking-books\/?utm_source=Google+Web+Stories&amp;utm_medium=Discover&amp;utm_campaign=Top+10++Ethical+Hacking+Books+You+Should+Read%21&amp;utm_id=Web+Stories\" data-tooltip-icon=\"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2022\/11\/Blue-Purple-Futuristic-Virus-Hacks-Youtube-Thumbnail.png\" data-tooltip-text=\"Top 10 Ethical Hacking Books for Beginner to Advanced - GUVI Blogs\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.2736486486486494% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.349515em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Learn More<\/span><\/span><\/h3>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you an aspiring Ethical Hacker? Then, these top 10 Ethical Hacking books will come in handy for your career building. Read now!<\/p>\n","protected":false},"author":1,"featured_media":25298,"template":"","meta":{"web_stories_products":[],"web_stories_publisher_logo":11617,"web_stories_poster":[]},"web_story_category":[912],"web_story_tag":[],"story_data":{"version":46,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":2160,"height":3840,"sizes":{"medium":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-169x300.png","width":169,"height":300,"filesize":53536,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-169x300.png"},"large":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-576x1024.png","width":576,"height":1024,"filesize":438746,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-576x1024.png"},"thumbnail":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-150x150.png","width":150,"height":150,"filesize":27710,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-150x150.png"},"medium_large":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-768x1365.png","width":768,"height":1365,"filesize":732408,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-768x1365.png"},"1536x1536":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-864x1536.png","width":864,"height":1536,"filesize":871131,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-864x1536.png"},"2048x2048":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-1152x2048.png","width":1152,"height":2048,"filesize":1388223,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-1152x2048.png"},"web-stories-poster-portrait":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-640x853.png","width":640,"height":853,"filesize":426425,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-640x853.png"},"web-stories-publisher-logo":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-96x96.png","width":96,"height":96,"filesize":13152,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-96x96.png"},"web-stories-thumbnail":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1-150x267.png","width":150,"height":267,"filesize":43959,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1-150x267.png"},"full":{"file":"Top-10-Ethical-Hacking-Books-You-Should-Read-1.png","width":2160,"height":3840,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#cc7b52","blurHash":"UDC5ek}=Ioni025S$*X8-9t6NcjZ^i-Q$zoc","creationDate":1694082226000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Top-10-Ethical-Hacking-Books-You-Should-Read-1.png","id":25295,"alt":"Top 10 Ethical Hacking Books You Should Read!","local":false},"type":"image","x":0,"y":-59,"width":423,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"6be8def5-02c3-4cd4-8796-d1d6ae2650b0","isBackground":true},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":36,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700; color: #fff\">Top 10&nbsp;<\/span>\n<span style=\"font-weight: 700; color: #fff\">Ethical Hacking Books You Should Read!<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":73,"y":99,"width":277,"height":171,"id":"7525557a-43cb-4a90-8d10-7b2e175954e3"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":21.6,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Beginner to Advanced<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":72,"y":61,"width":216,"height":25,"basedOn":"7525557a-43cb-4a90-8d10-7b2e175954e3","id":"301f14d3-6c34-4578-94fe-aeb29d48c498","type":"text","marginOffset":0.48937499999999545}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"1925fb65-82c0-4836-b6ee-59871f898dbf","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Basics-of-Hacking-Penetration-Testing-169x300.png","width":169,"height":300,"filesize":46287,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-169x300.png"},"large":{"file":"Basics-of-Hacking-Penetration-Testing-576x1024.png","width":576,"height":1024,"filesize":309803,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-576x1024.png"},"thumbnail":{"file":"Basics-of-Hacking-Penetration-Testing-150x150.png","width":150,"height":150,"filesize":19347,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-150x150.png"},"medium_large":{"file":"Basics-of-Hacking-Penetration-Testing-768x1365.png","width":768,"height":1365,"filesize":789677,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-768x1365.png"},"1536x1536":{"file":"Basics-of-Hacking-Penetration-Testing-864x1536.png","width":864,"height":1536,"filesize":622746,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-864x1536.png"},"web-stories-poster-portrait":{"file":"Basics-of-Hacking-Penetration-Testing-640x853.png","width":640,"height":853,"filesize":404899,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-640x853.png"},"web-stories-publisher-logo":{"file":"Basics-of-Hacking-Penetration-Testing-96x96.png","width":96,"height":96,"filesize":7871,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-96x96.png"},"web-stories-thumbnail":{"file":"Basics-of-Hacking-Penetration-Testing-150x267.png","width":150,"height":267,"filesize":37566,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing-150x267.png"},"full":{"file":"Basics-of-Hacking-Penetration-Testing.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bbcbd4","blurHash":"UVKLRBt7yDoK.Tj[MwbIDOofRjaeRjWBx]oL","creationDate":1694079938000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Basics-of-Hacking-Penetration-Testing.png","id":25283,"alt":"Basics of Hacking & Penetration Testing","local":false},"type":"image","x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e3a69e12-8ca5-42df-9ac1-348c51831022","isBackground":true},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700\">Basics of Hacking &amp; Penetration Testing<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":63,"y":26,"width":287,"height":64,"id":"c2994e35-2980-4691-9fa5-8d659becc308"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"Written by Patrick Engebretson, this book dives deep into the tools and processes used by penetration testers to gain access to the systems. The book is apt for freshers who are infosec professionals &amp; security consultants.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":62,"y":107,"width":275,"height":173,"id":"a956db0a-56a7-402c-8311-20030eda0cc7"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"6415e01c-90de-4f66-949c-13c17e364dca","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["c2994e35-2980-4691-9fa5-8d659becc308"]},{"id":"46eaf2d5-7e79-43b8-a1c4-11f3dd4e7cfe","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["a956db0a-56a7-402c-8311-20030eda0cc7"]}],"id":"3ede0d32-1f6a-4acf-ab06-8879492ed0a1","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-169x300.png","width":169,"height":300,"filesize":50883,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-169x300.png"},"large":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-576x1024.png","width":576,"height":1024,"filesize":351467,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-576x1024.png"},"thumbnail":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-150x150.png","width":150,"height":150,"filesize":21952,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-150x150.png"},"medium_large":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-768x1365.png","width":768,"height":1365,"filesize":863960,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-768x1365.png"},"1536x1536":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-864x1536.png","width":864,"height":1536,"filesize":712990,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-864x1536.png"},"web-stories-poster-portrait":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-640x853.png","width":640,"height":853,"filesize":457881,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-640x853.png"},"web-stories-publisher-logo":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-96x96.png","width":96,"height":96,"filesize":8747,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-96x96.png"},"web-stories-thumbnail":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-150x267.png","width":150,"height":267,"filesize":41315,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_-150x267.png"},"full":{"file":"Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bbcad4","blurHash":"UVK2O{t8%gax.TayIAofDNofWBaeRlWVx]jZ","creationDate":"2023-09-07T09:49:27.000Z","src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-Beginners-Guide-to-Computer-Hacking-Basic-Security-Penetration-Testing_.png","id":25284,"alt":"Hacking- Beginner\u2019s Guide to Computer Hacking, Basic Security, Penetration Testing_","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"117d7530-de6c-4e7c-921a-410fab96fddc","isBackground":true,"type":"image","basedOn":"e3a69e12-8ca5-42df-9ac1-348c51831022"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Hacking: Beginner\u2019s Guide to Computer H<\/span><span style=\"font-weight: 700\">acking, Basic Security, Penetration Testing&nbsp;<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":22,"width":301,"height":129,"id":"c3c3e40b-3557-4bbb-9aa8-7c0694cfd314","type":"text","basedOn":"c2994e35-2980-4691-9fa5-8d659becc308"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by John Stark, This book is about the history of hacking types, various types of hacking attacks, basic hacking tools and software, and hiding IP addresses.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":55,"y":168,"width":275,"height":107,"id":"ea73c9dc-dfab-4a1d-8b75-f8f057325b15","type":"text","basedOn":"a956db0a-56a7-402c-8311-20030eda0cc7"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"226664fe-4b33-4c20-aaeb-a1dd338b740a","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["c3c3e40b-3557-4bbb-9aa8-7c0694cfd314"]},{"id":"80740b56-a57d-4f5d-bd90-3ccf6f8a1b53","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["ea73c9dc-dfab-4a1d-8b75-f8f057325b15"]}],"id":"b0e19391-f8ef-42d6-9143-c5857efa8c42","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Hacking-The-art-of-exploitation-169x300.png","width":169,"height":300,"filesize":49067,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-169x300.png"},"large":{"file":"Hacking-The-art-of-exploitation-576x1024.png","width":576,"height":1024,"filesize":326478,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-576x1024.png"},"thumbnail":{"file":"Hacking-The-art-of-exploitation-150x150.png","width":150,"height":150,"filesize":21000,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-150x150.png"},"medium_large":{"file":"Hacking-The-art-of-exploitation-768x1365.png","width":768,"height":1365,"filesize":817932,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-768x1365.png"},"1536x1536":{"file":"Hacking-The-art-of-exploitation-864x1536.png","width":864,"height":1536,"filesize":655728,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-864x1536.png"},"web-stories-poster-portrait":{"file":"Hacking-The-art-of-exploitation-640x853.png","width":640,"height":853,"filesize":426418,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-640x853.png"},"web-stories-publisher-logo":{"file":"Hacking-The-art-of-exploitation-96x96.png","width":96,"height":96,"filesize":8647,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-96x96.png"},"web-stories-thumbnail":{"file":"Hacking-The-art-of-exploitation-150x267.png","width":150,"height":267,"filesize":40125,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation-150x267.png"},"full":{"file":"Hacking-The-art-of-exploitation.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bacbd4","blurHash":"UWJ[*Tt7%hWW.Ta#IAofDOofaeWBRjaex]bH","creationDate":1694080476000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Hacking-The-art-of-exploitation.png","id":25285,"alt":"Hacking- The art of exploitation","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"ce22154c-6e67-4e47-8072-4cc5741f65bd","isBackground":true,"basedOn":"117d7530-de6c-4e7c-921a-410fab96fddc","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Hacking: The art of exploitation<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":39,"width":307,"height":64,"id":"42de6d09-f200-455f-b9bd-860468045a3a","basedOn":"c3c3e40b-3557-4bbb-9aa8-7c0694cfd314","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Jon Erickson, This book helps you understand how to develop exploits rather than just using them. This book is a must-read, if you wish to level up your ethical hacking game. It mainly focuses on network security &amp; computer security. .","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":118,"width":275,"height":173,"id":"aa031297-285f-4178-8f52-9d3e14091ae2","basedOn":"ea73c9dc-dfab-4a1d-8b75-f8f057325b15","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"e516cbfa-e4cf-4a61-aa32-f365f1d1c2cb","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["42de6d09-f200-455f-b9bd-860468045a3a"]},{"id":"b8c90701-433e-4d77-82fe-1d83fc998e98","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["aa031297-285f-4178-8f52-9d3e14091ae2"]}],"id":"d63c14c8-bebb-4dc8-8af0-3a5470b58e69","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-169x300.png","width":169,"height":300,"filesize":41907,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-169x300.png"},"large":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-576x1024.png","width":576,"height":1024,"filesize":255845,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-576x1024.png"},"thumbnail":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-150x150.png","width":150,"height":150,"filesize":17422,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-150x150.png"},"medium_large":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-768x1365.png","width":768,"height":1365,"filesize":695480,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-768x1365.png"},"1536x1536":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-864x1536.png","width":864,"height":1536,"filesize":525299,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-864x1536.png"},"web-stories-poster-portrait":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-640x853.png","width":640,"height":853,"filesize":338561,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-640x853.png"},"web-stories-publisher-logo":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-96x96.png","width":96,"height":96,"filesize":7410,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-96x96.png"},"web-stories-thumbnail":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-150x267.png","width":150,"height":267,"filesize":34710,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook-150x267.png"},"full":{"file":"Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bccfda","blurHash":"UVK2O{t8%gWC.TazIAofDOofaeaeR*axx]az","creationDate":1694080629000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Kali-Linux-\u2013-An-Ethical-Hackers-Cookbook.png","id":25286,"alt":"Kali Linux \u2013 An Ethical Hacker\u2019s Cookbook","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0ffbcf69-f983-4008-ae9d-8d95b6e3ff4f","isBackground":true,"basedOn":"ce22154c-6e67-4e47-8072-4cc5741f65bd","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Kali Linux \u2013 An Ethical Hacker\u2019s Cookbook<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":39,"width":307,"height":64,"id":"8dfb3c5e-86bd-48a8-b179-d7380094407c","basedOn":"42de6d09-f200-455f-b9bd-860468045a3a","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Himanshu Sharma, this book will help you get started with the installation &amp; configuration of Kali Linux. You will also be acquainted with conducting advanced penetration testing &amp; performing network exploitation.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":118,"width":275,"height":151,"id":"e4a3db16-cd1a-4429-abb6-90b436d8e604","basedOn":"aa031297-285f-4178-8f52-9d3e14091ae2","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"9e86318d-e8fe-4aac-82dd-f1eb746b5e68","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["8dfb3c5e-86bd-48a8-b179-d7380094407c"]},{"id":"9b84dd75-0f73-4c00-9fcc-faf212b3574f","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["e4a3db16-cd1a-4429-abb6-90b436d8e604"]}],"id":"131aa334-72de-4ca4-9e59-cee276ab2be7","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Metasploit-The-Penetration-Testers-Guide-169x300.png","width":169,"height":300,"filesize":44788,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-169x300.png"},"large":{"file":"Metasploit-The-Penetration-Testers-Guide-576x1024.png","width":576,"height":1024,"filesize":291768,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-576x1024.png"},"thumbnail":{"file":"Metasploit-The-Penetration-Testers-Guide-150x150.png","width":150,"height":150,"filesize":18947,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-150x150.png"},"medium_large":{"file":"Metasploit-The-Penetration-Testers-Guide-768x1365.png","width":768,"height":1365,"filesize":759845,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-768x1365.png"},"1536x1536":{"file":"Metasploit-The-Penetration-Testers-Guide-864x1536.png","width":864,"height":1536,"filesize":594389,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-864x1536.png"},"web-stories-poster-portrait":{"file":"Metasploit-The-Penetration-Testers-Guide-640x853.png","width":640,"height":853,"filesize":381977,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-640x853.png"},"web-stories-publisher-logo":{"file":"Metasploit-The-Penetration-Testers-Guide-96x96.png","width":96,"height":96,"filesize":7823,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-96x96.png"},"web-stories-thumbnail":{"file":"Metasploit-The-Penetration-Testers-Guide-150x267.png","width":150,"height":267,"filesize":36847,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide-150x267.png"},"full":{"file":"Metasploit-The-Penetration-Testers-Guide.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bbccd6","blurHash":"USJ[;ktR%gWB?wayITof8^ofaeaeS4ayx]ay","creationDate":1694080852000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Metasploit-The-Penetration-Testers-Guide.png","id":25287,"alt":"Metasploit- The Penetration Tester\u2019s Guide","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"d8554294-e3f6-4cc7-88fc-eb6878adfd03","isBackground":true,"basedOn":"0ffbcf69-f983-4008-ae9d-8d95b6e3ff4f","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Metasploit: The Penetration Tester\u2019s Guide<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":17,"width":307,"height":96,"id":"5b7b0765-ac6a-4002-ad72-12c65586f6c1","basedOn":"8dfb3c5e-86bd-48a8-b179-d7380094407c","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by authors: David Kennedy, Jim O\u2019Gorman, Devon Kearns, &amp; Mati Aharoni, this book will teach you all about the Metasploit framework, a powerful tool for hackers to exploit IP addresses and ports in it.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":140,"width":306,"height":129,"id":"383a8b2d-4308-49d6-9ba7-d8bb6a3a8f10","basedOn":"e4a3db16-cd1a-4429-abb6-90b436d8e604","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"350a1912-16a7-4b1a-95c1-54bbd93fc2a3","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["5b7b0765-ac6a-4002-ad72-12c65586f6c1"]},{"id":"e63c4faf-7be6-4828-b702-23d59bb6e6b5","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["383a8b2d-4308-49d6-9ba7-d8bb6a3a8f10"]}],"id":"d37372c2-6e69-4a07-beb7-d46147e47e96","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-169x300.png","width":169,"height":300,"filesize":45012,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-169x300.png"},"large":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-576x1024.png","width":576,"height":1024,"filesize":297018,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-576x1024.png"},"thumbnail":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-150x150.png","width":150,"height":150,"filesize":19305,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-150x150.png"},"medium_large":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-768x1365.png","width":768,"height":1365,"filesize":770613,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-768x1365.png"},"1536x1536":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-864x1536.png","width":864,"height":1536,"filesize":606098,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-864x1536.png"},"web-stories-poster-portrait":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-640x853.png","width":640,"height":853,"filesize":389730,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-640x853.png"},"web-stories-publisher-logo":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-96x96.png","width":96,"height":96,"filesize":7926,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-96x96.png"},"web-stories-thumbnail":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking-150x267.png","width":150,"height":267,"filesize":37061,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking-150x267.png"},"full":{"file":"Penetration-Testing-A-Hands-On-Introduction-to-Hacking.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bacbd4","blurHash":"UPJ[;mxu-:WB?^ayIBof8wofadWBN{WBx]ay","creationDate":1694081050000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Penetration-Testing-A-Hands-On-Introduction-to-Hacking.png","id":25288,"alt":"Penetration Testing- A Hands-On Introduction to Hacking","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"9c767d22-5cf7-4ad9-b2c7-7f6f06d83789","isBackground":true,"basedOn":"d8554294-e3f6-4cc7-88fc-eb6878adfd03","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Penetration Testing: A Hands-On Introduction to Hacking<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":55,"y":17,"width":307,"height":96,"id":"c55e9f68-0474-440e-a23d-6cc6717e9991","basedOn":"5b7b0765-ac6a-4002-ad72-12c65586f6c1","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Georgia Weidman, this book focuses on the core skills &amp; techniques of penetration testing. You\u2019ll also learn the prime stages of an actual assessment: gathering information, unraveling vulnerabilities &amp; so on.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":129,"width":275,"height":151,"id":"81eba2b5-ed07-4324-a6ff-b0a6e1db3da5","basedOn":"383a8b2d-4308-49d6-9ba7-d8bb6a3a8f10","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"a99f60dc-c62a-40c8-b2c2-a3ce79328087","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["c55e9f68-0474-440e-a23d-6cc6717e9991"]}],"id":"c18117cb-9c4d-4db8-97c7-1f98b1b08b13","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-169x300.png","width":169,"height":300,"filesize":47310,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-169x300.png"},"large":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-576x1024.png","width":576,"height":1024,"filesize":319713,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-576x1024.png"},"thumbnail":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-150x150.png","width":150,"height":150,"filesize":19466,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-150x150.png"},"medium_large":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-768x1365.png","width":768,"height":1365,"filesize":812136,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-768x1365.png"},"1536x1536":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-864x1536.png","width":864,"height":1536,"filesize":649442,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-864x1536.png"},"web-stories-poster-portrait":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-640x853.png","width":640,"height":853,"filesize":418580,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-640x853.png"},"web-stories-publisher-logo":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-96x96.png","width":96,"height":96,"filesize":7904,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-96x96.png"},"web-stories-thumbnail":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-150x267.png","width":150,"height":267,"filesize":38926,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing-150x267.png"},"full":{"file":"The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bccfd9","blurHash":"UVJ[*Ut7%gWV.Ta|IAofDOofWAWBRjWBx]fk","creationDate":1694081129000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Hacker-Playbook-3-Practical-Guide-to-Penetration-Testing.png","id":25289,"alt":"The Hacker Playbook 3- Practical Guide to Penetration Testing","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"d01ec752-403c-4aca-90d2-3294ac1def91","isBackground":true,"basedOn":"9c767d22-5cf7-4ad9-b2c7-7f6f06d83789","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">The Hacker Playbook 3: Practical Guide to Penetration Testing<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":55,"y":33,"width":307,"height":96,"id":"d60e8235-87a1-4014-a250-c9cd2dce93ff","basedOn":"c55e9f68-0474-440e-a23d-6cc6717e9991","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Peter Kim, This book focuses on real-world attack exploitation, custom malware persistence,&amp; more. It will help you advance your offensive hacking skills &amp; attack parts. ","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":145,"width":308,"height":129,"id":"882974fc-0d4c-457b-b9e6-d057c8f2e96b","basedOn":"81eba2b5-ed07-4324-a6ff-b0a6e1db3da5","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"dd418808-0141-405a-bcf8-860c8b81a077","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["d60e8235-87a1-4014-a250-c9cd2dce93ff"]},{"id":"72153932-c32f-4a3b-a5a5-fca6bed3a68e","type":"effect-fly-in","flyInDir":"rightToLeft","duration":600,"delay":0,"targets":["882974fc-0d4c-457b-b9e6-d057c8f2e96b"]}],"id":"975a8994-e216-45a1-af6b-e5f0282604c3","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-169x300.png","width":169,"height":300,"filesize":46868,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-169x300.png"},"large":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-576x1024.png","width":576,"height":1024,"filesize":317053,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-576x1024.png"},"thumbnail":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-150x150.png","width":150,"height":150,"filesize":19980,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-150x150.png"},"medium_large":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-768x1365.png","width":768,"height":1365,"filesize":809653,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-768x1365.png"},"1536x1536":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-864x1536.png","width":864,"height":1536,"filesize":651745,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-864x1536.png"},"web-stories-poster-portrait":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-640x853.png","width":640,"height":853,"filesize":415831,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-640x853.png"},"web-stories-publisher-logo":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-96x96.png","width":96,"height":96,"filesize":8167,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-96x96.png"},"web-stories-thumbnail":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-150x267.png","width":150,"height":267,"filesize":38586,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters-150x267.png"},"full":{"file":"Black-Hat-Python-Python-Programming-for-Hackers-Pentesters.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#6e4e3a","blurHash":"UWKLUHt7yDWV.TazMwofDOofaeaeaeaetla}","creationDate":1694081291000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Black-Hat-Python-Python-Programming-for-Hackers-Pentesters.png","id":25290,"alt":"Black Hat Python- Python Programming for Hackers & Pentesters","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e2546892-ae9d-4868-b186-7dece9006ce4","isBackground":true,"basedOn":"d01ec752-403c-4aca-90d2-3294ac1def91","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Black Hat Python: Python Programming for Hackers &amp; Pentesters<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":55,"y":53,"width":307,"height":96,"id":"5fcba651-fd59-4c2f-8d9f-cb0361247ecf","basedOn":"d60e8235-87a1-4014-a250-c9cd2dce93ff","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Justin Seitz, this book covers the darker side of Python\u2019s capabilities like infecting virtual machines, writing network sniffers, creating trojans, etc. ","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":56,"y":165,"width":275,"height":129,"id":"08238801-041e-4f8d-bc5b-019ef73eb387","basedOn":"882974fc-0d4c-457b-b9e6-d057c8f2e96b","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"523dcd75-3185-4f83-80ce-45b9f925e0eb","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["5fcba651-fd59-4c2f-8d9f-cb0361247ecf"]},{"id":"817ccbae-6a47-45ee-b6e0-e9b4a66329f7","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["08238801-041e-4f8d-bc5b-019ef73eb387"]}],"id":"0ce82065-5cb1-45dc-b458-51c25f8026b7","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-169x300.png","width":169,"height":300,"filesize":46422,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-169x300.png"},"large":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-576x1024.png","width":576,"height":1024,"filesize":288365,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-576x1024.png"},"thumbnail":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-150x150.png","width":150,"height":150,"filesize":19458,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-150x150.png"},"medium_large":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-768x1365.png","width":768,"height":1365,"filesize":752027,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-768x1365.png"},"1536x1536":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-864x1536.png","width":864,"height":1536,"filesize":583448,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-864x1536.png"},"web-stories-poster-portrait":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-640x853.png","width":640,"height":853,"filesize":379807,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-640x853.png"},"web-stories-publisher-logo":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-96x96.png","width":96,"height":96,"filesize":8211,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-96x96.png"},"web-stories-thumbnail":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-150x267.png","width":150,"height":267,"filesize":38369,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws-150x267.png"},"full":{"file":"The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bacad3","blurHash":"UVK2S3t7%gj[.TbHITkCDOofWAWBR*WBx]j]","creationDate":1694081628000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/The-Web-Application-Hackers-Handbook-Finding-and-Exploiting-Security-Flaws.png","id":25292,"alt":"the web application hacker\u2019s handbook- Finding and Exploiting Security Flaws","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"388b075a-f6f8-4b68-b791-d05d0ac50c08","isBackground":true,"basedOn":"e2546892-ae9d-4868-b186-7dece9006ce4","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">The Web Application Hacker\u2019s Handbook: Finding and Exploiting Security Flaws<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":55,"y":16,"width":307,"height":128,"id":"7d090581-4f7e-4646-ae3c-49c448019be5","basedOn":"5fcba651-fd59-4c2f-8d9f-cb0361247ecf","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Dafydd Stuttard &amp; Marcus Pinto, The updated edition focuses on updated web applications, exposing them to attacks and executing fraudulent transactions.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":54,"y":180,"width":309,"height":107,"id":"e9c66358-ad04-4718-9e95-3e425e0408f3","basedOn":"08238801-041e-4f8d-bc5b-019ef73eb387","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"54f14b56-655d-4d7a-b588-3a65c0885175","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["7d090581-4f7e-4646-ae3c-49c448019be5"]},{"id":"f2416b46-8f14-4262-9f72-ce85042dd88b","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["e9c66358-ad04-4718-9e95-3e425e0408f3"]}],"id":"da6b01a8-6161-44d8-81ed-70b06f2bed6a","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1080,"height":1920,"sizes":{"medium":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-169x300.png","width":169,"height":300,"filesize":42294,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-169x300.png"},"large":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-576x1024.png","width":576,"height":1024,"filesize":275965,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-576x1024.png"},"thumbnail":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-150x150.png","width":150,"height":150,"filesize":17344,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-150x150.png"},"medium_large":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-768x1365.png","width":768,"height":1365,"filesize":739298,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-768x1365.png"},"1536x1536":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-864x1536.png","width":864,"height":1536,"filesize":581965,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-864x1536.png"},"web-stories-poster-portrait":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-640x853.png","width":640,"height":853,"filesize":363873,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-640x853.png"},"web-stories-publisher-logo":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-96x96.png","width":96,"height":96,"filesize":7233,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-96x96.png"},"web-stories-thumbnail":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-150x267.png","width":150,"height":267,"filesize":34823,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast-150x267.png"},"full":{"file":"Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast.png","width":1080,"height":1920,"mimeType":"image\/png","sourceUrl":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#bcccd5","blurHash":"UJK.I{xukEWX*0bHM_of4Tofnif5x^f6o}WV","creationDate":1694081551000,"src":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/Web-Security-Testing-Cookbook-Systematic-Techniques-to-Find-Problems-Fast.png","id":25291,"alt":"Web Security Testing Cookbook- Systematic Techniques to Find Problems Fast","local":false},"x":0,"y":-59,"width":427,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"3fc1b2f0-c20b-4ac3-b5a4-af88c4b20a39","isBackground":true,"basedOn":"388b075a-f6f8-4b68-b791-d05d0ac50c08","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700\">Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":57,"y":0,"width":307,"height":128,"id":"677fe6fc-a843-4367-b0bf-08e31dd4814e","basedOn":"7d090581-4f7e-4646-ae3c-49c448019be5","type":"text"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":18,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"Written by Paco Hope &amp; &nbsp;Ben Walther, This book teaches you how to check for the most common web security issues, it also acquaints you with installing and configuring free &amp; good security testing tools.","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":54,"y":154,"width":310,"height":129,"id":"ea645190-6cfe-448f-a197-0a84d2ad8042","basedOn":"e9c66358-ad04-4718-9e95-3e425e0408f3","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[{"id":"5e16a190-a6de-49a6-a22e-babee3798ddf","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["677fe6fc-a843-4367-b0bf-08e31dd4814e"]},{"id":"b5a357cc-ff00-4410-ad9a-a5250b65c204","type":"effect-fly-in","flyInDir":"rightToLeft","duration":2000,"delay":0,"targets":["ea645190-6cfe-448f-a197-0a84d2ad8042"]}],"id":"6afb4ac8-0a51-491a-aaaf-76a8a9aaf3ee","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"backgroundColor":{"color":{"r":15,"g":23,"b":36}},"type":"shape","x":0,"y":-59,"width":412,"height":744,"mask":{"type":"rectangle"},"id":"9e9559a2-adc9-4d6f-bb01-efb6f0914c60"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":27,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700; color: #fff\">Want to dive deeper into the world of Ethical Hacking?&nbsp;<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":65,"y":223,"width":284,"height":97,"id":"dff98f07-7153-4ac9-b797-a12677e6faa3"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"backgroundColor":{"color":{"r":11,"g":150,"b":61}},"type":"shape","x":127,"y":355,"width":160,"height":46,"mask":{"type":"rectangle"},"id":"3af58872-997b-4292-a2ca-8fdf027db653","borderRadius":{"locked":true,"topLeft":5,"topRight":5,"bottomRight":5,"bottomLeft":5}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":21.6,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"type":"text","content":"<span style=\"font-weight: 700; color: #fff\">Learn More<\/span>","borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"x":151,"y":365,"width":111,"height":25,"id":"2b909c3f-f2ce-4915-929b-1ffbd6739677","link":{"needsProxy":false,"url":"https:\/\/www.guvi.in\/blog\/best-ethical-hacking-books\/?utm_source=Google+Web+Stories&utm_medium=Discover&utm_campaign=Top+10++Ethical+Hacking+Books+You+Should+Read%21&utm_id=Web+Stories","rel":[],"icon":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2022\/11\/Blue-Purple-Futuristic-Virus-Hacks-Youtube-Thumbnail.png","desc":"Top 10 Ethical Hacking Books for Beginner to Advanced - GUVI Blogs"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"71dae96b-fcff-4782-8d12-b65fa3a4f1c8","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"c98d69ca-9d19-42e2-881d-4e3f5420f6bc"}}],"fonts":{"Roboto":{"family":"Roboto","fallbacks":["sans-serif"],"weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":7,"currentStoryStyles":{"colors":[]}},"style_presets":{"colors":[{"color":{"r":11,"g":150,"b":61}}],"textStyles":[]},"story_poster":{"id":25298,"url":"https:\/\/www.guvi.in\/blog\/wp-content\/uploads\/2023\/09\/cropped-Top-10-Ethical-Hacking-Books-You-Should-Read-2.png","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web-story\/25280"}],"collection":[{"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/www.guvi.in\/blog\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":9,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web-story\/25280\/revisions"}],"predecessor-version":[{"id":25332,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web-story\/25280\/revisions\/25332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/media\/25298"}],"wp:attachment":[{"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/media?parent=25280"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web_story_category?post=25280"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web_story_tag?post=25280"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/web-story\/25280\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/www.guvi.in\/blog\/wp-json\/web-stories\/v1\/media\/11617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}