The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Table of contents
-
Full text access
Front-matter
Copyright
Dedication
Acknowledgments
About the Author
About the Technical Editor
Introduction
-
Book chapter Abstract only
Chapter 1 - What Is Penetration Testing?
-
Book chapter Abstract only
Chapter 2 - Reconnaissance
-
Book chapter Abstract only
Chapter 3 - Scanning
-
Book chapter Abstract only
Chapter 4 - Exploitation
-
Book chapter Abstract only
Chapter 5 - Web-Based Exploitation
-
Book chapter Abstract only
Chapter 6 - Maintaining Access with Backdoors and Rootkits
-
Book chapter Abstract only
Chapter 7 - Wrapping Up the Penetration Test
-
Book chapter No access
Index
About the book
Description
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security.
The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.
This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security.
The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.
This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.
Key Features
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
Details
Copyright
Copyright © 2011 Elsevier Inc. All rights reserved
You currently don't have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.
Authors
Source: https://www.sciencedirect.com/book/9781597496551/the-basics-of-hacking-and-penetration-testing
0 Response to "The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy"
Post a Comment