Ethical Hacking and Penetration Testing GuideCRC Press, 29/09/2017 - 531 من الصفحات Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don?t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications. |
طبعات أخرى - عرض جميع المقتطفات
Ethical Hacking and Penetration Testing Guide <span dir=ltr>Rafay Baloch</span> لا تتوفر معاينة - 2017 |
عبارات ومصطلحات مألوفة
access point application ARP spoofing attack vector authentication backdoor BackTrack browser brute force attacks burp bypass CAPTCHA chapter Chapter client side compromise connect cookies crack credentials CSRF database default discussed DOM-based XSS dvwa e-mail enumerate etc/passwd file example execute exploit firewall following command FTP server function Google hacker hacking hashes host input inside install interface IP address JavaScript launch Let’s Linux log-in MAC address machine malicious Metasploit meterpreter module mysql Nessus netcat nmap open _ basedir operating system options output packet parameter password payload penetration test pentest perform phishing protocol query rainbow tables request running scenario screenshot script session shell shellcode SNMP spoofing spoofing attack SQL injection SSRF Step symlink take a look token tool traffic upload username victim vulnerable code webserver Windows Wireshark XSS vulnerability