The Basics of Hacking and Penetration Testing et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus

Acheter d'occasion
D'occasion - Très bon Voir les détails
Prix : EUR 15,34

ou
 
   
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 4,66
Amazon Rachète cet article
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire The Basics of Hacking and Penetration Testing sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [Anglais] [Broché]

Patrick Engebretson


Voir les offres de ces vendeurs.


Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 15,83  
Broché --  
Broché --  
Vendez cet article - Prix de rachat jusqu'à EUR 4,66
Vendez The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 4,66, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.
Il y a une édition plus récente de cet article:
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy 5.0 étoiles sur 5 (1)
EUR 17,24
En stock.

Offres spéciales et liens associés



Descriptions du produit

Revue de presse

"...an introduction to what ethical hacking involves, and a primer for more indepth technical volumes...it does get its hands dirty with guides to using the main tools. But each technique or piece of software is only covered to the depth required to give you a good feel for what's going on..." - Network Security, December 2011

Présentation de l'éditeur

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.



  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?


Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.4 étoiles sur 5  75 commentaires
51 internautes sur 55 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent book - Delivers on the Title 15 août 2011
Par jlh - Publié sur Amazon.com
Format:Broché|Achat vérifié
This is a really great book that delivers on the promise described in the title. It covers the basics of hacking and penetration test and makes no assumption of prior security or hacking knowledge. This is an excellent resource for anyone looking to jumpstart his or her knowledge in this area.

The book takes the reader on a quick step-by-step journey through a penetration test beginning with Information Gathering, moving into Scanning, then Exploitation, and concluding with Report Writing. While the book does not cover any particular methodology like OSSTM or PTES it does a nice job of laying out each step in an orderly and straightforward manner. The book covers all of the major tools, in an appropriate order so the reader gets a good sense of how to run the tools and how they relate to each other.

The book gets down to business in chapter 1 and wastes no time in bringing the reader up to speed on the latest tools and techniques. One of the greatest strengths of the book is its size. Most people will be able to read through the entire book in just a few days. Another benefit of covering only the basics is that the book should have a longer shelf life. As the author points out, a Nmap Syn scan has been the same for the past 10 years.

If you're looking for an in-depth coverage of any particular tool like Nmap, Metasploit, or the like, this is not the book for you. You're better off buying a book dedicated to the tool you're interested in.

On the flip side, if you're interested in seeing the whole picture and getting a feel for how to run and use the major tools used in a basic penetration test this is a good buy.

Finally, I enjoyed the laidback and casual writing style of the author. This made the chapters easier to digest and kept me interested while still delivering enough technical meat to satisfy my knowledge and process requirements.
22 internautes sur 24 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A delicious sip of network security and PEN test 10 octobre 2011
Par Jose - Publié sur Amazon.com
Format:Broché|Achat vérifié
Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers (or provide additional value to my Projects), network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about PEN testing tools or techniques, this book delivers what is promised on the cover and much more!

All chapters are very coherent, meticously structured and nicely integrated between each other thanks to the PEN test process it follows. There are even suggestions about how to test all the examples in a secure and practical way. Of course, a virtual lab using any of the virtualization technologies is highly advised. The author suggests VMware, I used Parallels, but there are several free tools out there including Virtual PC or VirtualBox, both are free as well.

The book uses Metasploit framework/software for its examples but makes strong emphasize on concepts rather than tools, which it is very good in my opinion because whatever is being taught can be later extrapolated using other tools. PEN test is more a process than mere scripts and tools. I also like the fact that you don't need a very strong knowledge on networking, cryptography or C++ in order to understand this book. Instead It relies on easy vocabulary with lot of examples and screen-shoots that help almost anyone who is new into this field (a basic knowledge of Linux won't hurt though, that made it easy for me to understand some commands)

-- Additional bibliography --

Once you're done with this one I recommend these two books: Metasploit: The Penetration Tester's Guide, by David Kennedy and Nmap Cookbook: The Fat-free Guide to Network Scanning. The 1st one expands a bit more on the Metasploit software and its components, which are briefly explained on the Syngress book. The Nmap cookbook, talks about nmap scanning tool and different switches you can use when working on the scanning phase; nmap cookbook is not a theory book, but visual examples of how to use the tool depending of the target or desired goal
19 internautes sur 23 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Really helped my understanding of Penetration Testing 19 août 2011
Par Frederick Schmidt - Publié sur Amazon.com
Format:Broché|Achat vérifié
I work for a small company with little resources for security when it comes to protection against people with malicious intent. We run our own web and data servers and have been hacked on at least on occasion. This book really helped me learn how to test my network for weaknesses. Gave me best practice tips for protecting our servers against unwanted penetration. Most of all it showed me how little I new about how easy it was to penetrate our network even with off the shelf applications. This book is a must for small businesses trying to run big business operations.
28 internautes sur 36 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 This book is confused on what it is and what it is doing 23 mars 2012
Par GK - Publié sur Amazon.com
Format:Broché|Achat vérifié
Pros:
Some good introductions to ideas and tools of penetration testing.

Cons:
Not coherent or consistent at times.

This book starts and finishes well, but the middle is insufficient in information and lacks consistency. More than once in the penetration/exploit sections I had to check to see if I was missing a page. The biggest problem with coherence in the book has to do with the fact that the author explains that most pen tests will be done from the outside, but then out of nowhere switches from penetration testing to hacking a machine while actually sitting at it! The author would talk about what could be done from the outside, but then go on to how it is done from the inside (physically at the machine) with no explanation for the jump. I more than once had to check to see if I was missing a page, because the jumps were that drastic. Also many of the screen shots are not placed well, to the point where you have to stop reading and find the reference screenshot.

While there is a decent amount of good introductive information for those looking to get into or just learn about penetration testing, this book falls horribly short of what it could and should be. Bottom line, if you have no or little knowledge of penetration testing there is enough in this book to introduce you to some concepts and tools used in penetration testing. However this book is seriously lacking for anyone that is more than a novice.
6 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Interesting, Informative, and Brief - Excellent intro to Ethical Hacking 14 février 2012
Par Jim Johnson - Publié sur Amazon.com
Format:Broché|Achat vérifié
This book is a very interesting and informative read. I followed all of the steps almost verbatim and everything worked as written. The contents of the book have already been reviewed, and I don't find it necessary to regurgitate. I agree with the good reviews, this book rocks.

Here's a couple of tips:

1. Acquire a copy of Windows XP with no Service Pack (They are difficult to find, but keep looking. It is worth the wait). A pre Service Pack XP is an easy target using the steps outlined in the book. If you can't find a pre-SP XP, at least try to find one that doesn't yet have patch MS08-067. This patch makes for an easy win, which will motivate you to learn more. I think this is the patch used in the book for the example.

2. Get a computer capable of running Backtrack as the Host OS, and then proceed to load multiple Guest OSes into VMWare Player. VMWare Player is a free download from VMWare, and the best choice I have found for running virtual machines (Virtual Box is good but doesn't run multiple VMs at once). Also, you can make copies of the parent folder of the VM in order to keep a fresh, untainted copy for incredibly easy restoration after you've jacked it up.

3. Do all of the exercises in the book! It isn't enough to just read about it. You need to do it. This will make reading the book take 4 times longer but you will get 10 times more out of it. It's ok to read through the book and then go back, but my experience has shown that doing while reading is by far the more productive/efficient approach.

Have fun!
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?