Book description
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.
You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network.
You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like:
•Deploying the Metasploit framework’s reverse shells and embedding them in innocent-seeming files
•Capturing passwords in a corporate Windows network using Mimikatz
•Scanning (almost) every device on the internet to find potential victims
•Installing Linux rootkits that modify a victim’s operating system
•Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads
Along the way, you’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more.
Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you’ll be able to think like an ethical hacker?: someone who can carefully analyze systems and creatively gain access to them.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- About the Author
- About the Technical Reviewer
- BRIEF CONTENTS
- CONTENTS IN DETAIL
- ACKNOWLEDGMENTS
- FOREWORD
- INTRODUCTION
- 1 SETTING UP
- PART I NETWORK FUNDAMENTALS
- 2 CAPTURING TRAFFIC WITH ARP SPOOFING
- 3 ANALYZING CAPTURED TRAFFIC
- 4 CRAFTING TCP SHELLS AND BOTNETS
- PART II CRYPTOGRAPHY
- 5 CRYPTOGRAPHY AND RANSOMWARE
- 6 TLS AND DIFFIE-HELLMAN
- PART III SOCIAL ENGINEERING
- 7 PHISHING AND DEEPFAKES
- 8 SCANNING TARGETS
- PART IV EXPLOITATION
- 9 FUZZING FOR ZERO-DAY VULNERABILITIES
- 10 BUILDING TROJANS
- 11 BUILDING AND INSTALLING LINUX ROOTKITS
- 12 STEALING AND CRACKING PASSWORDS
- 13 SERIOUS CROSS-SITE SCRIPTING EXPLOITATION
- PART V CONTROLLING THE NETWORK
- 14 PIVOTING AND PRIVILEGE ESCALATION
- 15 MOVING THROUGH THE CORPORATE WINDOWS NETWORK
- 16 NEXT STEPS
- INDEX
Product information
- Title: Ethical Hacking
- Author(s):
- Release date: September 2021
- Publisher(s): No Starch Press
- ISBN: 9781718501874
You might also like
video
Certified Ethical Hacker (CEH), 2nd Edition
An updated edition of this video title is available. Please go to Certified Ethical Hacker, Version …
book
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification …
video
The Complete Ethical Hacking Course
A comprehensive course designed to cover from basic to the most advanced ethical hacking techniques using …
book
CEH v11 Certified Ethical Hacker Study Guide
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security …