The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Author: Patrick Engebretson | Language: English | ISBN:
B00DSNSQAC | Format: EPUB
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Description
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
- File Size: 2265 KB
- Print Length: 225 pages
- Publisher: Syngress; 2 edition (June 24, 2013)
- Sold by: Amazon Digital Services, Inc.
- Language: English
- ASIN: B00DSNSQAC
- Text-to-Speech: Enabled
X-Ray:
- Lending: Not Enabled
- Amazon Best Sellers Rank: #35,279 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
- #12
in Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Testing - #17
in Books > Computers & Technology > Internet & Web Culture > Hacking - #26
in Books > Computers & Technology > Business & Management > Privacy
- #12
in Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Testing - #17
in Books > Computers & Technology > Internet & Web Culture > Hacking - #26
in Books > Computers & Technology > Business & Management > Privacy
Yes, Kali Linux is the follow-up release of "Backtrack R3" from 2012, while Kali was released in ~March of 2013. Which is why you won't hear much about Backtrack, since it is now Kali. Sounds like a misinformed script kiddy who places more weight on tools than on knowledge which will get him far.... considering that this specific topic (Backtrack R3 -> Kali) is a fairly well-known fact and can be located in Google very easily. So anyone reading the initial reviewer's comment, please do not be swayed by his lack of knowledge. This is a great book that will help put you on the right track, but that track is a lot more than simply learning how to "use a tool" or running "a fill in the blank" scan, and clicking magic button. A novice approach such as what one would likely conclude from the original reviewer's lack of highly available knowledge in the field will only serve you problems should you get caught. You should always work on your own equipment and labs and/or with written and explicit authorization of the equipment of others specific to the scope of what activities will be taken. If you are serious about learning and actually entering in to the field; be forewarned it is massive and daunting, however, if you take it one step at a time and get a broad overview of the landscape first, you can begin to layout and map your path with regards to the various topics you will want to learn in the most logical manner possible. While I am far from "experienced" myself, it is a rewarding field that will likely become exponentially more rewarding and important with the growing array of expansive impacts to fields that have largely not been synonymous with Network or Information Security.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Preview
Link
Please Wait...