TY - GEN AU - Engebretson,Patrick TI - The basics of hacking and penetration testing (E BOOK): ethical hacking and penetration testing made easy. SN - 9781597496568 U1 - 005.8 PY - 2011/// CY - Burlington PB - Elsevier Science KW - Computer crimes -- Prevention KW - Computer hackers KW - Computer security KW - Computer software -- Testing KW - Electronic books N1 - Description based upon print version of record; FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft; HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers; Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?; Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX N2 - The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top UR - http://link.sub.su.se/sfxsub?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc& UR - http://proxy.lib.chalmers.se/login?url=http://library.books24x7.com/library.asp?^B&bookid=44730 UR - http://proxy.lib.chalmers.se/login?url=http://www.sciencedirect.com/science/book/9781597496551 UR - http://proxy.lib.ltu.se/login?url=http://site.ebrary.com/lib/lulea/docDetail.action?docID=10483470 UR - http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551 UR - http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551 UR - http://sfxeu10.hosted.exlibrisgroup.com/sfxjon/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc& UR - http://sfxeu10.hosted.exlibrisgroup.com/sfxkth?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc& UR - http://sfxeu11.hosted.exlibrisgroup.com/sfxmiu/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc& UR - http://www.dawsonera.com.db.ub.oru.se/depp/reader/protected/external/AbstractView/S9781597496568 UR - https://ezproxy.bibl.hkr.se/login?url=http://site.ebrary.com/lib/kristianstad/Top?id=10483470 UR - https://lt.ltag.bibl.liu.se/login?url=http://www.books24x7.com/marc.asp?bookid=44730 ER -