The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy


Patrick. Engebretson
Bok Engelsk 2013 · Electronic books.
Annen tittel
Utgitt
Burlington : : Elsevier Science, , 2013.
Omfang
1 online resource (223 p.)
Utgave
2nd ed.
Opplysninger
Description based upon print version of record.. - Front Cover; The Basics of Hacking and Penetration Testing: Ethical Hacking and PenetrationTesting Made Easy; Copyright; Dedication; Contents; Acknowledgments; About the Author; Introduction; Chapter 1 - What is Penetration Testing?; INTRODUCTION; SETTING THE STAGE; INTRODUCTION TO KALI AND BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH YOUR ATTACK MACHINE: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; WHERE DO I GO FROM HERE?; SUMMARY; Chapter 2 - Reconnaissance; INTRODUCTION; HTTRACK: WEBSITE COPIER. - DETECTING AND DEFENDING AGAINST ROOTKITS. - GOOGLE DIRECTIVES: PRACTICING YOUR GOOGLE-FUTHE HARVESTER: DISCOVERING AND LEVERAGING E-MAIL ADDRESSES; WHOIS; NETCRAFT; HOST; EXTRACTING INFORMATION FROM DNS; NSLOOKUP; DIG; FIERCE: WHAT TO DO WHEN ZONE TRANSFERS FAIL; EXTRACTING INFORMATION FROM E-MAIL SERVERS; METAGOOFIL; THREATAGENT: ATTACK OF THE DRONES; SOCIAL ENGINEERING; SIFTING THROUGH THE INTEL TO FIND ATTACKABLE TARGETS; HOW DO I PRACTICE THIS STEP?; WHERE DO I GO FROM HERE?; SUMMARY; Chapter 3 - Scanning; INTRODUCTION; PINGS AND PING SWEEPS; PORT SCANNING; THE THREE-WAY HANDSHAKE; USING NMAP TO PERFORM A TCP CONNECT SCAN. - PASSWORD RESETTING: THE BUILDING AND THE WRECKING BALLWIRESHARK: SNIFFING NETWORK TRAFFIC; MACOF: MAKING CHICKEN SALAD OUT OF CHICKEN SH∗T; ARMITAGE: INTRODUCING DOUG FLUTIE OF HACKING; WHY LEARN FIVE TOOLS WHEN ONE WORKS JUST AS WELL?; HOW DO I PRACTICE THIS STEP?; WHERE DO I GO FROM HERE?; SUMMARY; Chapter 5 - Social Engineering; INTRODUCTION; THE BASICS OF SET; WEBSITE ATTACK VECTORS; THE CREDENTIAL HARVESTER; OTHER OPTIONS WITHIN SET; SUMMARY; Chapter 6 - Web-Based Exploitation; INTRODUCTION; THE BASICS OF WEB HACKING; NIKTO: INTERROGATING WEB SERVERS; W3AF: MORE THAN JUST A PRETTY FACE. - SPIDERING: CRAWLING YOUR TARGET'S WEBSITEINTERCEPTING REQUESTS WITH WEBSCARAB; CODE INJECTION ATTACKS; CROSS-SITE SCRIPTING: BROWSERS THAT TRUST SITES; ZED ATTACK PROXY: BRINGING IT ALL TOGETHER UNDER ONE ROOF; INTERCEPTING IN ZAP; SPIDERING IN ZAP; SCANNING IN ZAP; HOW DO I PRACTICE THIS STEP?; WHERE DO I GO FROM HERE?; ADDITIONAL RESOURCES; SUMMARY; Chapter 7 - Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter; INTRODUCTION; NETCAT: THE SWISS ARMY KNIFE; NETCAT'S CRYPTIC COUSIN: CRYPTCAT; ROOTKITS; HACKER DEFENDER: IT IS NOT WHAT YOU THINK. - USING NMAP TO PERFORM AN SYN SCANUSING NMAP TO PERFORM UDP SCANS; USING NMAP TO PERFORM AN XMAS SCAN; USING NMAP TO PERFORM NULL SCANS; THE NMAP SCRIPTING ENGINE: FROM CATERPILLAR TO BUTTERFLY; PORT SCANNING WRAP UP; VULNERABILITY SCANNING; HOW DO I PRACTICE THIS STEP?; WHERE DO I GO FROM HERE?; SUMMARY; Chapter 4 - Exploitation; INTRODUCTION; MEDUSA: GAINING ACCESS TO REMOTE SERVICES; METASPLOIT: HACKING, HUGH JACKMAN STYLE!; JTR: KING OF THE PASSWORD CRACKERS; LOCAL PASSWORD CRACKING; REMOTE PASSWORD CRACKING; LINUX PASSWORD CRACKING AND A QUICK EXAMPLE OF PRIVILEGE ESCALATION. - The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and
Emner
Sjanger
Dewey
ISBN
9780124116443

Bibliotek som har denne