The Basics of Hacking and Penetration Testing || Reconnaissance
โ Scribed by Engebretson, Patrick
- Book ID
- 121279052
- Publisher
- Elsevier
- Year
- 2011
- Tongue
- English
- Weight
- 758 KB
- Edition
- 1
- Category
- Article
- ISBN
- 1597496553
No coin nor oath required. For personal study only.
โฆ Synopsis
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow youย to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
๐ SIMILAR VOLUMES
*The Basics of Web Hacking* introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to ove
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how to strengthen the security of their systems. He defines ethical hacking as a controlled attack to identify a security system's vulnerabilities. He goes beyond the technical aspects of p