𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Infinity Ethical Hacking: Learn basic to advance hacks

✍ Scribed by Sapp, Arthur S


Year
2020
Tongue
English
Leaves
73
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Infinity Ethical Hacking
Learn basic to advance hacks
Introduction
Who is this book intended for?
The difference between ethical hacking and cracking
The Hacker Ethic
Chapter 1: What is ethical hacking?
What is ethical hacking?
The need for ethical hackers
What is the difference between ethical hacking and cracking?
Roles and responsibilities of an ethical hacker
Chapter 2: Hacking as a career
The different types of ethical hacking
Black Box Ethical hacking
White Box Ethical hacking
Gray Box Ethical Hacking
The History of White Hat Hacking
Chapter 3: Making money freelance
What is freelancing?
The pros and cons of going freelance
Benefits
Cons
Start freelancing
I have experience, now what?
I have no experience, what should I do?
Premiums
Chapter 4: The Three Hats
Black hats
Zero Day vulnerability?
Black Hat Hacker Example
White hats
White Hat Hacker Example
Gray hats
Gray Hat Hacker Example
Chapter 5: Ethical hacking explained
The evolution of hacking
Examples: mischief or criminal?
What does it mean to be an ethical hacker?
Responsibilities of an Ethical Hacker
Hacker Ethics and Code of Conduct
Chapter 6: Scan your system
Port Scan
Network scan
Vulnerability scan
Live system check
War Dialing
Ping
Check ports and their status
Chapter 7: Penetration Tests
The purpose of penetration testing
Responsibilities for Cloud Pen testing
How often should you perform penetration tests?
Penetration test tools
Penetration Testing Strategies
Penetration testing of cloud-based applications
Step 1: Make sure you understand how the cloud provider policy works
Step 2: Come in with a plan
Step 3: Choose which tools you will use
Step 4: Observe the answer
Step 5: Find and remove vulnerabilities
General advice on Cloud Pen Testing
How can local security and cloud security be compared?
Chapter 8: Most Common Security Tools
SolarWinds Log and Event Manager
Screenshot of SolarWinds Log and Event Manager
SolarWinds Network Configuration Manager
SolarWinds User Device Tracker
Wireshark
Nessus Professional
Sniffing
TCP dump
Kismet
Nikto
OpenVAS
OSSEC
Nexpose
GFI LanGuard
Security tools for the cloud
Bitglass
Skyhigh Networks
NetsCheap
CipherCloud
Okta
Cloud Penetration Testing from the customer's point of view
The responsibilities of consumers and suppliers
Penetration testing Depends on the Cloud Service Model
IaaS model
PaaS model
SaaS model
Things to remember as a customer of Cloud Penetration Testing
Chapter 9: What do I need to know
The nature of the work
What is behind the surface of the track? What do you usually do?
What are the general assumptions people make about work?
How many hours a day do you work?
Are there any tips and shortcuts that can help you get to work?
Can you do things to differentiate yourself from the rest of the white hats?
What about the job is the worst and how do you deal with it?
Where is the pleasure in work? What makes it so attractive?
Customers and general advice
Is there anything you want your customers to know before seeking your help?
How much can you earn with this work?
How do you progress in this area?
What do customers tend to be over or undervalued?
What is the most important thing to remember?
Conclusion


πŸ“œ SIMILAR VOLUMES


Hacking: Learn the Basics of Ethical Hac
✍ Donovan, Martin πŸ“‚ Library πŸ“… 2016 🌐 English

Overview: If you’ve ever read about computer hacking, you might be surprised to learn that companies actually pay people to try to hack into their systems. It’s called β€œethical hacking”.

Ethical Hacking: A Beginners Guide To Le
✍ Lakshay Eshan πŸ“‚ Library πŸ“… 2018 πŸ› Shockwave Publishing 🌐 English

<p><b>This book is written for those people who want to hack systems to test identify the security holes and vulnerabilities of those systems.</b><p>This book outlines different tricks and techniques that an ethical hacker can use to assess the security of the systems, identify vulnerabilities and f