The basics of hacking and penetration testing (E BOOK) [Elektronisk resurs] : ethical hacking and penetration testing made easy. / Patrick Engebretson

By: Engebretson, PatrickPublisher: Burlington : Elsevier Science, 2011Description: 1 online resource (178 p.)ISBN: 9781597496568; 9781597496568Subject(s): Computer crimes -- Prevention | Computer hackers | Computer security | Computer software -- TestingGenre/Form: Electronic books.DDC classification: 005.8 Online resources: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online
Contents:
FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft
HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers
Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?
Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;
Summary: The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top
Tags from this library: No tags from this library for this title. Log in to add tags.

Description based upon print version of record.

FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft

HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers

Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?

Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.