Galleon 2026Download our mobile shopping application for faster and easy transaction.

Download on the App Store
Get it on Google Play
Welcome back!

Login your account for faster transaction.

Email
Password
Don't have an account?
or
Email
Sign up!

Create account for faster transaction.

Full Name
Email
Mobile
Password
Confirm Password

Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing

4.3 / 5

Product ID:

1456492

Identifier:

1979881103

Brand:

CREATESPACE

Model:

Shipping Weight:

0.75 lbs

Manufacturer:

CreateSpace Independent Publishing Platform

Shipping Dimension:

8.9 x 5.98 x 0.71 inches

Share on Social Media

₱1,998

+ ₱ 378

International Shipping

Shipping Cost from USA to Philippines inclusive of custom fees.

Cost too high? Check weight and dimension on product details and click "I think this is wrong?" link.

Get it between 2026-04-20 to 2026-04-27.

Additional 3 business days for provincial shipping.

- Price and Stocks may change without prior notice

- Packaging of actual item may differ from photo shown

  • Electrical items MAY be 110 volts.
  • 7 Day Return Policy
  • Cash On Delivery/Cash Upon Pickup Available

    Cash upon Pick-up - orders grand total must not exceed ₱5,000.00. Order will be pickup at Galleon's Office.

    Cash on Delivery - orders grand total must not exceed of ₱10,000.00 and must not exceed ₱5,000.00 for provincial areas. See all payment methods

DESCRIPTIONS

Learn to hack! This book will provide you with the best tools for hacking and also point out ways you can protect your systems. Step by Step instructions with command prompts are included. Below are some of the topics that are covered in this guide: Hacking into Wireless Networks Hacking into Computers and Smartphones Ethical Hacking Scanning Your Systems Pinpointing Specific Vulnerabilities The best tools for each kind of hacking Cracking Encryption Flaws in Websites and Applications Attacking with Frameworks Penetration Testing Linux Step by Step Commands to perform Phishing Advantages and Disadvantages of WEP, WPA, WPA2, etc Other Wireless Hacking Resources And various other subjects related to hacking If you really want to learn more about hacking, then this book will definitely provide you with detailed information as well as other resources you can learn from.

RELATED PRODUCTS

Confirm your age

You must be at least 18 years old to view this content. Please confirm your age.

Chat Support

Buy products not available in the Philippines.