The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd edition by Patrick Engebretson – Ebook PDF Instant Download/Delivery.9780124116412, 0124116418
Full download The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd edition after payment
Product details:
ISBN 10: 0124116418
ISBN 13: 9780124116412
Author: Patrick Engebretson
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd Table of contents:
Chapter 1 – What is Penetration Testing?
- INTRODUCTION
- SETTING THE STAGE
- INTRODUCTION TO KALI AND BACKTRACK LINUX: TOOLS. LOTS OF TOOLS
- WORKING WITH YOUR ATTACK MACHINE: STARTING THE ENGINE
- THE USE AND CREATION OF A HACKING LAB
- PHASES OF A PENETRATION TEST
- WHERE DO I GO FROM HERE?
- SUMMARY
Chapter 2 – Reconnaissance
- INTRODUCTION
- HTTRACK: WEBSITE COPIER
- GOOGLE DIRECTIVES: PRACTICING YOUR GOOGLE-FU
- THE HARVESTER: DISCOVERING AND LEVERAGING E-MAIL ADDRESSES
- WHOIS
- NETCRAFT
- HOST
- EXTRACTING INFORMATION FROM DNS
- NSLOOKUP
- DIG
- FIERCE: WHAT TO DO WHEN ZONE TRANSFERS FAIL
- EXTRACTING INFORMATION FROM E-MAIL SERVERS
- METAGOOFIL
- THREATAGENT: ATTACK OF THE DRONES
- SOCIAL ENGINEERING
- SIFTING THROUGH THE INTEL TO FIND ATTACKABLE TARGETS
- HOW DO I PRACTICE THIS STEP?
- WHERE DO I GO FROM HERE?
- SUMMARY
Chapter 3 – Scanning
- INTRODUCTION
- PINGS AND PING SWEEPS
- PORT SCANNING
- THE THREE-WAY HANDSHAKE
- USING NMAP TO PERFORM A TCP CONNECT SCAN
- USING NMAP TO PERFORM AN SYN SCAN
- USING NMAP TO PERFORM UDP SCANS
- USING NMAP TO PERFORM AN XMAS SCAN
- USING NMAP TO PERFORM NULL SCANS
- THE NMAP SCRIPTING ENGINE: FROM CATERPILLAR TO BUTTERFLY
- PORT SCANNING WRAP UP
- VULNERABILITY SCANNING
- HOW DO I PRACTICE THIS STEP?
- WHERE DO I GO FROM HERE?
- SUMMARY
Chapter 4 – Exploitation
- INTRODUCTION
- MEDUSA: GAINING ACCESS TO REMOTE SERVICES
- METASPLOIT: HACKING, HUGH JACKMAN STYLE!
- JTR: KING OF THE PASSWORD CRACKERS
- LOCAL PASSWORD CRACKING
- REMOTE PASSWORD CRACKING
- LINUX PASSWORD CRACKING AND A QUICK EXAMPLE OF PRIVILEGE ESCALATION
- PASSWORD RESETTING: THE BUILDING AND THE WRECKING BALL
- WIRESHARK: SNIFFING NETWORK TRAFFIC
- MACOF: MAKING CHICKEN SALAD OUT OF CHICKEN SH∗T
- ARMITAGE: INTRODUCING DOUG FLUTIE OF HACKING
- WHY LEARN FIVE TOOLS WHEN ONE WORKS JUST AS WELL?
- HOW DO I PRACTICE THIS STEP?
- WHERE DO I GO FROM HERE?
- SUMMARY
Chapter 5 – Social Engineering
- INTRODUCTION
- THE BASICS OF SET
- WEBSITE ATTACK VECTORS
- THE CREDENTIAL HARVESTER
- OTHER OPTIONS WITHIN SET
- SUMMARY
Chapter 6 – Web-Based Exploitation
- INTRODUCTION
- THE BASICS OF WEB HACKING
- NIKTO: INTERROGATING WEB SERVERS
- W3AF: MORE THAN JUST A PRETTY FACE
- SPIDERING: CRAWLING YOUR TARGET’S WEBSITE
- INTERCEPTING REQUESTS WITH WEBSCARAB
- CODE INJECTION ATTACKS
- CROSS-SITE SCRIPTING: BROWSERS THAT TRUST SITES
- ZED ATTACK PROXY: BRINGING IT ALL TOGETHER UNDER ONE ROOF
- INTERCEPTING IN ZAP
- SPIDERING IN ZAP
- SCANNING IN ZAP
- HOW DO I PRACTICE THIS STEP?
- WHERE DO I GO FROM HERE?
- ADDITIONAL RESOURCES
- SUMMARY
Chapter 7 – Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
- INTRODUCTION
- NETCAT: THE SWISS ARMY KNIFE
- NETCAT’S CRYPTIC COUSIN: CRYPTCAT
- ROOTKITS
- HACKER DEFENDER: IT IS NOT WHAT YOU THINK
- DETECTING AND DEFENDING AGAINST ROOTKITS
- METERPRETER: THE HAMMER THAT TURNS EVERYTHING INTO A NAIL
- HOW DO I PRACTICE THIS STEP?
- WHERE DO I GO FROM HERE?
- SUMMARY
Chapter 8 – Wrapping Up the Penetration Test
- INTRODUCTION
- WRITING THE PENETRATION TESTING REPORT
- EXECUTIVE SUMMARY
- DETAILED REPORT
- RAW OUTPUT
- YOU DO NOT HAVE TO GO HOME BUT YOU CANNOT STAY HERE
- WHERE DO I GO FROM HERE?
- WRAP UP
- THE CIRCLE OF LIFE
- SUMMARY
Index
People also search for The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy 2nd :
the basics of hacking and penetration testing latest edition
the basics of hacking and penetration testing by patrick engebretson
what is penetration hacking
what are the basics of hacking