The basics of hacking and penetration testing (E BOOK) [Elektronisk resurs] : ethical hacking and penetration testing made easy. / Patrick Engebretson

By: Engebretson, PatrickPublisher: Burlington : Elsevier Science, 2011Description: 1 online resource (178 p.)ISBN: 9781597496568; 9781597496568Subject(s): Computer crimes -- Prevention | Computer hackers | Computer security | Computer software -- TestingGenre/Form: Electronic books.DDC classification: 005.8 Online resources: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online
Contents:
FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft
HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers
Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?
Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;
Summary: The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 005.8 (Browse shelf) Link to resource Available MCSEB-1470
Total holds: 0

Description based upon print version of record.

FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft

HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers

Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?

Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.