The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson.
Material type: TextSeries: Syngress basics seriesPublication details: Waltham, MA : Elsevier, 2011.Description: xvii, 159 p. : ill. ; 24 cmISBN:- 9781597496551
- ScienceDirect eBook Series.
- 005.8 23
- QA76.9.A25 E5443 2011
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | MAIN General | AUE Library Collection | QA76.9.A25 E5443 2011 (Browse shelf(Opens below)) | 1 | Available | 10037491 | ||
Books | MAIN General | AUE Library Collection | QA76.9.A25 E5443 2011 (Browse shelf(Opens below)) | 2 | Available | 10037471 |
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9.A25 D525 2007 Principles of information systems security : | QA76.9.A25 D55 2002 Digital signatures / | QA76.9.A25 E5443 2011 The basics of hacking and penetration testing : | QA76.9.A25 E5443 2011 The basics of hacking and penetration testing : | QA76.9 .A25 E5443 2013 The basics of hacking and penetration testing : | QA76.9 .A25 F466 2010 Cryptography engineering : | QA76.9 .A25 F466 2010 Cryptography engineering : |
Includes bibliographical references and index.
What is penetration testing? -- Reconnaissance -- Scanning -- Exploitation -- Web based exploitation -- Maintaining access with backdoors and rootkits.
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases Written by an author who has practical experience as a Penetration Tester and who has taught "Introduction to Penetration Testing" for 5 years Utilizes Backtrack Linux distribution and the "core" tools required to complete a penetration test.
There are no comments on this title.