The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Anglais) Broché – 1 août 2013
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Produits fréquemment achetés ensemble
Les clients ayant acheté cet article ont également acheté
Descriptions du produit
Revue de presse
"...this is meant to be a practical book, and it positively encourages you to download, fire up and use the tools mentioned. The first chapter even tells you how to set up your own ‘hacking lab’. So whatever your interest in hacking, you’ll get the most out of the book if you follow along."--Network Security,Aug 1 2013
"For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need." - Network Security, December 2011
Présentation de l'éditeur
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Quels sont les autres articles que les clients achètent après avoir regardé cet article?
Commentaires en ligne
Meilleurs commentaires des clients
In think the best book for an introduction in the white hacking world !!
Commentaires client les plus utiles sur Amazon.com (beta)
The author takes you through setting up a great testing environment, and then proceeds to introduce every step of a successful penetration test, including all the tools and techniques. After reading this book, I have not only a solid foundation on and understanding of the tools and techniques of pentesting, I now know exactly what to research and learn further so that I can master those techniques.
Overall an excellent book for anyone looking to get into security and pentesting and one I would highly recommend.
I read the whole book and took copious notes due to my upcoming certification tests and interest in hacking. I used the tools in at least the 1st half of the book. I will update this review once I use the tools listed in the 2nd half of the book. As the book recommended, I downloaded Oracle VMWare, Kali-Linux and Metaspoitable. Don't be intimidated by these tasks -> Oracle VMWare is a piece of cake to install, and booting up two machines with Kali (which is the attacking machine) and Metasploitable (the woefully unprotected target machine) are pretty simple, too. All of these products are free. Preparing this test bed is your key to understanding and enjoying much of the material in this book. It also allows you to 'own' a system pretty simply, so you can get a feel for the core tasks in hacking.
As an example of success using tools and instructions in this book, I used nmap, a scanner, from the Kali virtual machine against the Metasploitable virtual machine, determined a vulnerability and associated exploit, and built and executed it using Metasploit, an exploit development and delivery platform. I consider this my first hack, and although it was made a breeze to do for the sake of learning as quickly as possible, I am still proud!!! It might be awhile before I give a presentation at Defcon, though ;-)
I have been a database developer for twenty years, working in various industries such as human resources, benefits and government, so I am not new to programming, but I think someone without programming training or experience should do fine with this book. The certifications I will be taking are Certified Ethical Hacker and Offensive Security Certified Professional.
The book does not go in-depth with many of the topics. It wouldn't be feasible, and then it wouldn't be an intro book anymore. There are books dedicated to just protocols alone. So if you are hoping for more explanations or tutorials on understanding things like TCP/IP - this is not it.
What I like best about this is that it assumes you have virtually no knowledge of the security field, can operate a computer with some skill, and understand how to follow directions. The high-level view is really best for the true novice, and helps to take away some of the intimidation of the field.
The downside, as is any technical book based on technology/internet, is that the information can get outdated or become inaccurate in a hurry. With a page limit for this kind of book, the author has to selectively choose what sources and references will appear in relation to the topic. The core principles stay the same, regardless, so don't get too upset if a site that's listed as an example is no longer functioning or the commands in bash have changed.
And one tangential bit/words of encouragement: if you are interested in infosec/cyber security but have no "formal" training/education, don't be afraid. Try it out. Something like this takes time and practice to get good at. (But also don't become a tool jockey - a good pen tester is well-rounded and is constantly adapting.)