Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Overview

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Each chapter contains hands-on examples that teach you how to interpret the results and utilize those results in later phases. Written by an author who has practical experience as a Penetration Tester and who has taught Introduction to Penetration Testing for 5 years. It utilizes Backtrack Linux distribution and the core tools required to complete a penetration test.

Subscriber Reviews

Average Rating: 4 out of 5 rating Based on 8 Ratings

"Nice introduction" - by Mike on 16-DEC-2012
Reviewer Rating: 1 star rating2 star rating3 star rating4 star rating5 star rating
Penetration testing and Hacking has been an influence in my life when studying computers. From a teenager I have studied topics relating to this topic but with no real knowledge how they would be applied in the real world situation. As I grew older, I ventured into areas of the ethical hacking mentality, understanding why and how my skills would be pieced together.
With that, I wish this book were written earlier in my life! This book covers the general flow of a penetration test, giving examples of tools and how to use them in order to complete each phase. If you're looking for a book to turn you into a 1337 H4x0r or Metasploit guru, then you probably have the wrong mentality. However, if you are looking for the fundamentals of performing a structured hack, using some of the most popular tools then look no further. In this book, it covers some basic knowledge of tools like whois, dig, Nmap, Nessus, Metasploit and Netcat, all of which are used by professionals alike.
If you want to start your career or study into the world of Hacking, I strongly recommend you start here!

Report as Inappropriate

Table of Contents