
The Basics of Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Made Easy
Description
Key Features
- Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
Readership
Security Consultants, beginning InfoSec professionals, Students
Table of Contents
Chapter 1: What is Penetration Testing?
Introduction
Introduction to Backtrack Linux: Tools. Lots of Tools
Working with Backtrack: Starting the Engine
The Use and Creation of a Hacking Lab
Phases of a Penetration Test
Chapter Review
SummaryChapter 2: Reconnaissance
Introduction
HTTrack: Website Copier
Google Directives – Practicing your Google-Fu
The Harvester: Discovering and Leveraging Email Addresses
Whois
Netcraft
Host
Extracting Information From DNS
Extracting Information from Email Servers
MetaGooFil
Social Engineering
Sifting through the Intel to Finding Attackable Targets
How Do I Practice This Step?
Where Do I Go From Here?
SummaryChapter 3: Scanning
Introduction
Pings and Ping Sweeps
Port Scanning
Vulnerability Scanning
How Do I Practice This Step?
Where Do I Go From Here?
SummaryChapter 4: Exploitation
Introduction
Gaining Access to Remote Services with Medusa
Metasploit: Hacking, Hugh Jackman Style!
John the Ripper: King of the Password Crackers
Password Resetting: Kind of Like Driving a Bulldozer through the Side a Building
Sniffing Network Traffic
Macof: Making Chicken Salad Out of Chicken Sh*t
Fast-Track Autopwn: Breaking Out the M-60
How Do I Practice This Step?
Where Do I Go From Here?
SummaryChapter 5: Web Based Exploitation
Introduction
Interrogating Web Servers: Nikto
Websecurify: Automated Web Vulnerability Scanning
Spidering: Crawling Your Target’s Website
Intercepting Requests with Web Scarab
Code Injection Attacks
Cross Site Scripting: Browsers that Trust Sites
How Do I Practice this Step?
Where Do I Go From Here?
SummaryChapter 6: Maintaining Access with Backdoors and Rootkits
Introduction
Netcat: The Swiss Army Knife
Netcat’s Cryptic Cousin: Cryptcat
Rootkits
Detecting and Defending Against Rootkits
How Do I Practice This Step?
Where Do I Go From Here?
SummaryChapter 7: Wrapping Up the Penetration Test
Introduction
Writing the Penetration Testing Report
You Don’t Have to Go Home but You Can’t Stay Here
Where Do I Go From Here?
Wrap up
The Circle of Life
Summary
Product details
- No. of pages: 180
- Language: English
- Copyright: © Syngress 2011
- Published: July 21, 2011
- Imprint: Syngress
- eBook ISBN: 9781597496568
About the Author
Patrick Engebretson
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "The Basics of Hacking and Penetration Testing"