Book description
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
- Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgments
- About the Author
- Introduction
- Chapter 1. What is Penetration Testing?
-
Chapter 2. Reconnaissance
- Information in This Chapter:
- Introduction
- HTTrack: Website Copier
- Google Directives: Practicing Your Google-Fu
- The Harvester: Discovering and Leveraging E-mail Addresses
- Whois
- Netcraft
- Host
- Extracting Information from DNS
- nslookup
- Dig
- Fierce: What to Do When Zone Transfers Fail
- Extracting Information from E-mail Servers
- MetaGooFil
- ThreatAgent: Attack of the Drones
- Social Engineering
- Sifting Through the Intel to Find Attackable Targets
- How Do I Practice This Step?
- Where Do I Go from Here?
- Summary
-
Chapter 3. Scanning
- Information in This Chapter:
- Introduction
- Pings and Ping Sweeps
- Port Scanning
- The Three-Way Handshake
- Using Nmap to Perform a TCP Connect Scan
- Using Nmap to Perform an SYN Scan
- Using Nmap to Perform UDP Scans
- Using Nmap to Perform an Xmas Scan
- Using Nmap to Perform Null Scans
- The Nmap Scripting Engine: From Caterpillar to Butterfly
- Port Scanning Wrap Up
- Vulnerability Scanning
- How Do I Practice This Step?
- Where Do I Go from Here?
- Summary
-
Chapter 4. Exploitation
- Information in This Chapter:
- Introduction
- Medusa: Gaining Access to Remote Services
- Metasploit: Hacking, Hugh Jackman Style!
- JtR: King of the Password Crackers
- Local Password Cracking
- Remote Password Cracking
- Linux Password Cracking and a Quick Example of Privilege Escalation
- Password Resetting: The Building and the Wrecking Ball
- Wireshark: Sniffing Network Traffic
- Macof: Making Chicken Salad Out of Chicken Sh∗t
- Armitage: Introducing Doug Flutie of Hacking
- Why Learn Five Tools When One Works Just as Well?
- How Do I Practice This Step?
- Where Do I Go from Here?
- Summary
- Chapter 5. Social Engineering
-
Chapter 6. Web-Based Exploitation
- Information in This Chapter:
- Introduction
- The Basics of Web Hacking
- Nikto: Interrogating Web Servers
- w3af: More than Just a Pretty Face
- Spidering: Crawling Your Target’s Website
- Intercepting Requests with Webscarab
- Code Injection Attacks
- Cross-Site Scripting: Browsers that Trust Sites
- ZED Attack Proxy: Bringing It All Together Under One Roof
- Intercepting in ZAP
- Spidering in ZAP
- Scanning in ZAP
- How Do I Practice This Step?
- Where Do I Go from Here?
- Additional Resources
- Summary
-
Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
- Information in This Chapter:
- Introduction
- Netcat: The Swiss Army Knife
- Netcat’s Cryptic Cousin: Cryptcat
- Rootkits
- Hacker Defender: It is Not What You Think
- Detecting and Defending Against Rootkits
- Meterpreter: The Hammer that Turns Everything into a Nail
- How Do I Practice This Step?
- Where Do I Go from Here?
- Summary
- Chapter 8. Wrapping Up the Penetration Test
- Index
Product information
- Title: The Basics of Hacking and Penetration Testing, 2nd Edition
- Author(s):
- Release date: June 2013
- Publisher(s): Syngress
- ISBN: 9780124116412
You might also like
book
The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to …
book
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to …
book
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for …
book
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration …