»
The Basics of Hacking and Penetration Testing
 
 

The Basics of Hacking and Penetration Testing, 2nd Edition

Ethical Hacking and Penetration Testing Made Easy

 
The Basics of Hacking and Penetration Testing, 2nd Edition,Patrick Engebretson,ISBN9780124116443
 
 
 

  

Syngress

9780124116443

9780124116412

225

235 X 191

Ethical hacking and penetration testing made easy.

Print Book + eBook

USD 35.94
USD 59.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 29.95

eBook
eBook Overview

VST format:

DRM Free included formats: EPub, Mobi, PDF

USD 20.97
USD 29.95
Add to Cart
 
 

Key Features

  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.

Description

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

Readership

Security Consultants, beginning InfoSec professionals, Students

Patrick Engebretson

Dr. Patrick Engebretson obtained his Doctor of Science degree with a specialization in Information Security from Dakota State University. He currently serves as an Assistant Professor of Information Assurance and also works as a Senior Penetration Tester for security firm in the Midwest.

Affiliations and Expertise

Dr. Patrick Engebretson obtained his Doctor of Science degree with a specialization in Information Security from Dakota State University. He currently serves as an Assistant Professor of Information Assurance and also works as a Senior Penetration Tester for security firm in the Midwest. His research interests include penetration testing, hacking, intrusion detection, exploitation, honey pots, and malware. In the past several years he has published many peer reviewed journal and conference papers in these areas. Dr. Engebretson has been invited by the Department of Homeland Security to share his research at the Software Assurance Forum in Washington, DC and has also spoken at Black Hat in Las Vegas. He regularly attends advanced exploitation and penetration testing trainings from industry recognized professionals and holds several certifications. He teaches graduate and undergraduate courses in penetration testing, wireless security, and intrusion detection, and advanced exploitation.

The Basics of Hacking and Penetration Testing, 2nd Edition

Chapter 1: What is Penetration Testing?
Introduction
Introduction to Backtrack Linux: Tools. Lots of Tools
Working with Backtrack: Starting the Engine
The Use and Creation of a Hacking Lab
Phases of a Penetration Test
Chapter Review
Summary

Chapter 2: Reconnaissance
Introduction
HTTrack: Website Copier
Google Directives – Practicing your Google-Fu
The Harvester: Discovering and Leveraging Email Addresses
Whois
Netcraft
Host
Extracting Information From DNS
Extracting Information from Email Servers
MetaGooFil
Social Engineering
Sifting through the Intel to Finding Attackable Targets
How Do I Practice This Step?
Where Do I Go From Here?
Summary

Chapter 3: Scanning
Introduction
Pings and Ping Sweeps
Port Scanning
Vulnerability Scanning
How Do I Practice This Step?
Where Do I Go From Here?
Summary

Chapter 4: Exploitation
Introduction
Gaining Access to Remote Services with Medusa
Metasploit: Hacking, Hugh Jackman Style!
John the Ripper: King of the Password Crackers
Password Resetting: Kind of Like Driving a Bulldozer through the Side a Building
Sniffing Network Traffic
Macof: Making Chicken Salad Out of Chicken Sh*t
Fast-Track Autopwn: Breaking Out the M-60
How Do I Practice This Step?
Where Do I Go From Here?
Summary

Chapter 5: Web Based Exploitation
Introduction
Interrogating Web Servers: Nikto
Websecurify: Automated Web Vulnerability Scanning
Spidering: Crawling Your Target’s Website
Intercepting Requests with Web Scarab
Code Injection Attacks
Cross Site Scripting: Browsers that Trust Sites
How Do I Practice this Step?
Where Do I Go From Here?
Summary

Chapter 6: Maintaining Access with Backdoors and Rootkits
Introduction
Netcat: The Swiss Army Knife
Netcat’s Cryptic Cousin: Cryptcat
Rootkits
Detecting and Defending Against Rootkits
How Do I Practice This Step?
Where Do I Go From Here?
Summary

Chapter 7: Wrapping Up the Penetration Test
Introduction
Writing the Penetration Testing Report
You Don’t Have to Go Home but You Can’t Stay Here
Where Do I Go From Here?
Wrap up
The Circle of Life
Summary

 

 

 

 

 

 

Quotes and reviews

"...this is meant to be a practical book, and it positively encourages you to download, fire up and use the tools mentioned. The first chapter even tells you how to set up your own ‘hacking lab’. So whatever your interest in hacking, you’ll get the most out of the book if you follow along."--Network Security,Aug 1 2013

"For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need." - Network Security, December 2011

 
 
Cyber Monday SALE Upto 50 Percent OFF | Use Code CYBER14
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ

Contact Us