Ethical Hacking and Penetration Testing Guide 1st edition by Rafay Baloch – Ebook PDF Instant Download/Delivery. 9781351381345, 1351381342
Full download Ethical Hacking and Penetration Testing Guide 1st edition after payment
Product details:
ISBN 10: 1351381342
ISBN 13: 9781351381345
Author: Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Ethical Hacking and Penetration Testing Guide 1st Table of contents:
Chapter 1: Introduction to Hacking
- Important Terminologies
- Asset
- Vulnerability
- Threat
- Exploit
- Risk
- What Is a Penetration Test?
- Vulnerability Assessments versus Penetration Test
- Preengagement
- Rules of Engagement
- Milestones
- Penetration Testing Methodologies
- OSSTMM
- NIST
- OWASP
- Categories of Penetration Test
- Black Box
- White Box
- Gray Box
- Types of Penetration Tests
- Network Penetration Test
- Web Application Penetration Test
- Mobile Application Penetration Test
- Social Engineering Penetration Test
- Physical Penetration Test
- Report Writing
- Understanding the Audience
- Executive Class
- Management Class
- Technical Class
- Writing Reports
- Structure of a Penetration Testing Report
- Cover Page
- Table of Contents
- Executive Summary
- Remediation Report
- Vulnerability Assessment Summary
- Tabular Summary
- Risk Assessment
- Risk Assessment Matrix
- Methodology
- Detailed Findings
- Description
- Explanation
- Risk
- Recommendation
- Reports
- Conclusion
- Structure of a Penetration Testing Report
- Understanding the Audience
Chapter 2: Linux Basics
- Major Linux Operating Systems
- File Structure inside of Linux
- File Permission in Linux
- Group Permission
- Linux Advance/Special Permission
- Link Permission
- Suid & Guid Permission
- Stickybit Permission
- Chatter Permission
- Most Common and Important Commands
- Linux Scheduler (Cron Job)
- Cron Permission
- Cron Files
- Users inside of Linux
- Linux Services
- Linux Password Storage
- Linux Logging
- Common Applications of Linux
- What Is BackTrack?
- How to Get BackTrack 5 Running
- Installing BackTrack on Virtual Box
- Installing BackTrack on a Portable USB
- Installing BackTrack on Your Hard Drive
- BackTrack Basics
- Changing the Default Screen Resolution
- Some Unforgettable Basics
- Changing the Password
- Clearing the Screen
- Listing the Contents of a Directory
- Displaying Contents of a Specific Directory
- Displaying the Contents of a File
- Creating a Directory
- Changing the Directories
- Windows
- Linux
- Creating a Text File
- Copying a File
- Current Working Directory
- Renaming a File
- Moving a File
- Removing a File
- Locating Certain Files inside BackTrack
- Text Editors inside BackTrack
- Getting to Know Your Network
- Dhclient
- Services
- MySQL
- SSHD
- Postgresql
- Other Online Resources
Chapter 3: Information Gathering Techniques
- Active Information Gathering
- Passive Information Gathering
- Sources of Information Gathering
- Copying Websites Locally
- Information Gathering with Whois
- Finding Other Websites Hosted on the Same Server
- Yougetsignal.com
- Tracing the Location
- Traceroute
- ICMP Traceroute
- TCP Traceroute
- Usage
- UDP Traceroute
- Usage
- NeoTrace
- Cheops-ng
- Enumerating and Fingerprinting the Webservers
- Intercepting a Response
- Acunetix Vulnerability Scanner
- WhatWeb
- Netcraft
- Google Hacking
- Some Basic Parameters
- Site
- Example
- TIP regarding Filetype
- Google Hacking Database
- Hackersforcharity.org/ghdb
- Xcode Exploit Scanner
- File Analysis
- Foca
- Harvesting E-Mail Lists
- Gathering Wordlist from a Target Website
- Scanning for Subdomains
- TheHarvester
- Fierce in BackTrack
- Scanning for SSL Version
- DNS Enumeration
- Interacting with DNS Servers
- Nslookup
- DIG
- Forward DNS Lookup
- Forward DNS Lookup with Fierce
- Reverse DNS
- Reverse DNS Lookup with Dig
- Reverse DNS Lookup with Fierce
- Zone Transfers
- Zone Transfer with Host Command
- Automating Zone Transfers
- DNS Cache Snooping
- What Is DNS Cache Snooping?
- Nonrecursive Method
- Recursive Method
- What Is the Likelihood of Name Servers Allowing Recursive/Nonrecursive Queries?
- Attack Scenario
- Automating DNS Cache Snooping Attacks
- Enumerating SNMP
- Problem with SNMP
- Sniffing SNMP Passwords
- OneSixtyOne
- Snmpenum
- SolarWinds Toolset
- SNMP Sweep
- SNMP Brute Force and Dictionary
- SNMP Brute Force Tool
- SNMP Dictionary Attack Tool
- SMTP Enumeration
- Detecting Load Balancers
- Load Balancer Detector
- Determining Real IP behind Load Balancers
- Bypassing CloudFlare Protection
- Method 1: Resolvers
- Method 2: Subdomain Trick
- Method 3: Mail Servers
- Intelligence Gathering Using Shodan
- Further Reading
- Conclusion
- Interacting with DNS Servers
Chapter 4: Target Enumeration and Port Scanning Techniques
- Host Discovery
- Scanning for Open Ports and Services
- Types of Port Scanning
- Understanding the TCP Three-Way Handshake
- TCP Flags
- Port Status Types
- TCP SYN Scan
- TCP Connect Scan
- NULL, FIN, and XMAS Scans
- NULL Scan
- FIN Scan
- XMAS Scan
- TCP ACK Scan
- Responses
- UDP Port Scan
- Anonymous Scan Types
- IDLE Scan
- Scanning for a Vulnerable Host
- Performing an IDLE Scan with NMAP
- TCP FTP Bounce Scan
- Service Version Detection
- OS Fingerprinting
- POF
- Output
- Normal Format
- Grepable Format
- XML Format
- Advanced Firewall/IDS Evading Techniques
- Timing Technique
- Wireshark Output
- Fragmented Packets
- Wireshark Output
- Source Port Scan
- Specifying an MTU
- Sending Bad Checksums
- Decoys
- ZENMAP
- Further Reading
Chapter 5: Vulnerability Assessment
- What Are Vulnerability Scanners and How Do They Work?
- Pros and Cons of a Vulnerability Scanner
- Vulnerability Assessment with Nmap
- Updating the Database
- Scanning MS08_067_netapi
- Testing SCADA Environments with Nmap
- Installation
- Usage
- Nessus Vulnerability Scanner
- Home Feed
- Professional Feed
- Installing Nessus on BackTrack
- Adding a User
- Nessus Control Panel
- Reports
- Mobile
People also search for Ethical Hacking and Penetration Testing Guide 1st :
synopsis of ethical hacking and penetration testing guide
ethical hacking and penetration testing guide book
are ethical hacking and penetration testing the same
ethical hacking vs penetration testing