This one-of-a-kind guide offers a comprehensive overview of the hacking
landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security
field. Next, the book describes the security testing
process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking
(Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.