The Basics of Hacking and Penetration Testing (2nd Ed.) Ethical Hacking and Penetration Testing Made Easy
Auteur : Engebretson Patrick
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
2. Reconnaissance
3. Scanning
4. Exploitation
5. Web Based Exploitation
6. Maintaining Access with Backdoors and Rootkits
7. Trapping Up the Penetration Test
Security Consultants, beginning InfoSec professionals, Students
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
- Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test
Date de parution : 09-2013
Ouvrage de 225 p.
19x23.4 cm
Thèmes de The Basics of Hacking and Penetration Testing :
Mots-clés :
Kali Linux; Backtrack Linux; Creating a hacking lab; Penetration testing; Penetration testing methodologies; Google directives; Information gathering; Reconnaissance; Social engineering; Fping; Nessus; Nmap scripting engine (NSE); Nmap; Ping sweeps; Port scanning; Vulnerability scanning; Armitage; John the Ripper; Macof; Medusa; Metasploit; Password resetting; Wireshark; Antivirus avoidance; Credential harvester; Java applet attack; Social-engineer toolkit (SET); Website attack vectors; Cross-site scripting (XSS); Nikto; SQL injection; w3af; Web-based exploitation; WebScarab; Zed attack proxy (ZAP); Advanced hacker training; Penetration testing report