The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easyby Patrick Engebretson
Pub. Date: 08/04/2011
Publisher: Elsevier Science
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap,/i>… See more details below
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
- Elsevier Science
- Publication date:
- Product dimensions:
- 7.40(w) x 9.10(h) x 0.50(d)
Table of Contents
Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Web Based Exploitation Chapter 6. Maintaining Access with Backdoors and Rootkits Chapter 7. Trapping Up the Penetration Test
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
Are you interested in learning about hacking and penetration testing? If you are, then this book is for you! Author Patrick Engebretson , has done an outstanding job of writing a book that is meant to be a single starting point for anyone interested in the topics of hacking and penetration testing. Engebretson, begins by introducing the concept of penetration testing and ethical hacking. In addition, the author focuses on reconnaissance, also known as information gathering. He then presents a brief overview of pings and ping sweeps before moving into the specifics of scanning. The author then, focuses on exploitation, which is the process most newcomers associate directly with hacking. He continues by reviewing techniques and tools for interrogating web servers. In addition, the author focuses on the use and implementation of backdoors and rootkits. Finally, he discusses the importance of writing the penetration testing report and examined specific details about what needs to be included and the potential pitfalls for hackers who have never written a penetration testing report. This most excellent book certainly covers specific tools and topics. Perhaps more importantly, this book examines how the tools fit together and how they rely on one another to be successful.
This is a great book for those who are looking to get into the field and don't have an idea or a mentor to help them.
For those of you planning to be a black hat hacker, no luck for you!
This book taught me alot of the things i need to know about ethical hacking. This is a great book just to keep by your bed and flip through. 5 stars!
I wanted to check it out before i bought it, but of the 35 pages included in the sample, 32 were acknowledgements, the table of contents, etc. The other 3 (really just over 2) pages were definitions of pen testing. If that is any indication of the rest of the book, its mostly fluff.