The Basics Of Hacking And Penetration Testing

Author: Patrick Engebretson
Editor: Elsevier
ISBN: 0124116418
File Size: 72,77 MB
Format: PDF
Read: 8297
Download

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
The Basics of Hacking and Penetration Testing
Language: en
Pages: 225
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013-06-24 - Publisher: Elsevier

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to
Ethical Hacking and Penetration Testing Guide
Language: en
Pages: 531
Authors: Rafay Baloch
Categories: Computers
Type: BOOK - Published: 2017-09-29 - Publisher: CRC Press

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to
Penetration Testing
Language: en
Pages: 528
Authors: Georgia Weidman
Categories: Computers
Type: BOOK - Published: 2014-06-14 - Publisher: No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a
Advanced Penetration Testing
Language: en
Pages: 288
Authors: Wil Allsopp
Categories: Computers
Type: BOOK - Published: 2017-03-20 - Publisher: John Wiley & Sons

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates
AWS Penetration Testing
Language: en
Pages: 330
Authors: Jonathan Helmus
Categories: Computers
Type: BOOK - Published: 2020-12-04 - Publisher: Packt Publishing Ltd

Get to grips with security assessment, vulnerability exploitation, workload security, and encryption with this guide to ethical hacking and learn to secure your AWS environment Key Features Perform cybersecurity events such as red or blue team activities and functional testing Gain an overview and understanding of AWS penetration testing and