gogogo
Syndetics cover image
Image from Syndetics

The basics of hacking and penetration testing [electronic book] : ethical hacking and penetration testing made easy / Patrick Engebretson.

By: Contributor(s): Material type: TextTextSeries: Syngress basics seriesPublication details: Waltham, MA : Elsevier, 2010.ISBN:
  • 1597496553 (alk. paper)
  • 9781597496551 (alk. paper)
Subject(s): Genre/Form: Online resources:
Contents:
What is penetration testing? -- Reconnaissance -- Scanning -- Exploitation -- Web based exploitation -- Maintaining access with backdoors and rootkits.
No physical items for this record

Enhanced descriptions from Syndetics:

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy - no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools - as well as the introduction to a four-step methodology for conducting a penetration test or hack - the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security.

The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.

This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.

Includes bibliographical references and index.

What is penetration testing? -- Reconnaissance -- Scanning -- Exploitation -- Web based exploitation -- Maintaining access with backdoors and rootkits.

Table of contents provided by Syndetics

  • Chapter 1 What is Penetration Testing?
  • Chapter 2 Reconnaissance
  • Chapter 3 Scanning
  • Chapter 4 Exploitation
  • Chapter 5 Web Based Exploitation
  • Chapter 6 Maintaining Access with Backdoors and Rootkits
  • Chapter 7 Trapping Up the Penetration Test

Author notes provided by Syndetics

Dr. Patrick Engebretson obtained his Doctor of Science degree with a specialization in Information Security from Dakota State University. He currently serves as an Assistant Professor of Information Assurance and also works as a Senior Penetration Tester for security firm in the Midwest.

Powered by Koha