- Tapa blanda: 225 páginas
- Editor: Syngress; Edición: 2 (1 de agosto de 2013)
- Colección: Basics
- Idioma: Inglés
- ISBN-10: 0124116442
- ISBN-13: 978-0124116443
- Valoración media de los clientes: 1 opinión de cliente
- Clasificación en los más vendidos de Amazon: nº38.731 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- Ver el Índice completo
Compara Precios en Amazon
+ Envío GRATIS
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Inglés) Tapa blanda – 1 ago 2013
|Nuevo desde||Usado desde|
Comprados juntos habitualmente
Los clientes que compraron este producto también compraron
Descripción del producto
"...this is meant to be a practical book, and it positively encourages you to download, fire up and use the tools mentioned. The first chapter even tells you how to set up your own ‘hacking lab’. So whatever your interest in hacking, you’ll get the most out of the book if you follow along."--Network Security,Aug 1 2013
"For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need." - Network Security, December 2011
Reseña del editor
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
- Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
¿Qué otros productos compran los clientes tras ver este producto?
Opiniones de clientes
Principales opiniones de clientes
Ha surgido un problema al filtrar las opiniones justo en este momento. Vuelva a intentarlo en otro momento.
Opiniones de clientes más útiles en Amazon.com
If you think you can get more information from the internet, you're probably right, but where to begin gets overwhelming. To the reviewer who mentions there is more on the internet, obviously believes the internet never lies. The book is structured well and for the price, you shouldn't complain.
Gave the book 4 stars because I felt it was a little dated and wishing the author would begin on the 3rd addition!
I read the whole book and took copious notes due to my upcoming certification tests and interest in hacking. I used the tools in at least the 1st half of the book. I will update this review once I use the tools listed in the 2nd half of the book. As the book recommended, I downloaded Oracle VMWare, Kali-Linux and Metaspoitable. Don't be intimidated by these tasks -> Oracle VMWare is a piece of cake to install, and booting up two machines with Kali (which is the attacking machine) and Metasploitable (the woefully unprotected target machine) are pretty simple, too. All of these products are free. Preparing this test bed is your key to understanding and enjoying much of the material in this book. It also allows you to 'own' a system pretty simply, so you can get a feel for the core tasks in hacking.
As an example of success using tools and instructions in this book, I used nmap, a scanner, from the Kali virtual machine against the Metasploitable virtual machine, determined a vulnerability and associated exploit, and built and executed it using Metasploit, an exploit development and delivery platform. I consider this my first hack, and although it was made a breeze to do for the sake of learning as quickly as possible, I am still proud!!! It might be awhile before I give a presentation at Defcon, though ;-)
I have been a database developer for twenty years, working in various industries such as human resources, benefits and government, so I am not new to programming, but I think someone without programming training or experience should do fine with this book. The certifications I will be taking are Certified Ethical Hacker and Offensive Security Certified Professional.