The basics of hacking and penetration testing ethical hacking and penetration testing made easy / Dr. Patrick Engebretson.
Material type: TextPublisher: Amsterdam : Syngress, [2013]Edition: 2nd edition. David Kennedy, technical editorDescription: xviii, 204 pages : illustrations (black and white)Content type: text | still image Media type: computer Carrier type: online resourceISBN: 9780124116412 (ebook)Other title: Hacking and penetration testingSubject(s): Penetration testing (Computer security) | Computer hackers | Computer software -- Testing | Computer crimes -- Prevention | Computers and IT | Computing & information technology | Computer fraud & hacking | Information technology: general issues | Enterprise software | Computer security | Business & ManagementGenre/Form: LOC classification: QA76.9.A25 | E5443 2013Online access: Click here to access online Also available in printed form ISBN 9780124116443Summary: An introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilise and interpret the results of modern day hacking tools which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.Item type | Current library | Home library | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|
E-book | Electronic publication | Electronic publication | Available |
Previous edition: 2011.
Includes bibliographical references and index.
An introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilise and interpret the results of modern day hacking tools which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Also available in printed form ISBN 9780124116443
Electronic reproduction. Askews and Holts. Mode of access: World Wide Web.
There are no comments on this title.