000 06019 a2200517 4500
003 Nust
005 20170207164658.0
020 _a9781597496568
020 _a9781597496568
035 _a(AU-PeEL)EBL730200
035 _a(EBZ)ebs923806e
035 _a(EBZ)ebs923806e
035 _a(OCoLC)742333329
035 _a(WaSeSS)ssj0000507797
035 _a(WaSeSS)ssj0000507797
035 _aDAW21337174
040 _cNust
082 0 0 _a005.8
100 1 _aEngebretson, Patrick.
245 1 4 _aThe basics of hacking and penetration testing (E BOOK)
_h[Elektronisk resurs] :
_bethical hacking and penetration testing made easy. /
_cPatrick Engebretson
260 _aBurlington :
_bElsevier Science,
_c2011.
300 _a1 online resource (178 p.)
500 _aDescription based upon print version of record.
505 0 _aFRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft
505 0 _aHostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers
505 0 _aPassword resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?
505 0 _aWhere do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;
520 _aThe Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top
650 4 _aComputer crimes -- Prevention.
650 4 _aComputer hackers.
650 4 _aComputer security.
650 4 _aComputer software -- Testing.
655 0 _aElectronic books.
856 4 0 _uhttp://link.sub.su.se/sfxsub?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&
856 4 0 _uhttp://proxy.lib.chalmers.se/login?url=http://library.books24x7.com/library.asp?^B&bookid=44730
856 4 0 _uhttp://proxy.lib.chalmers.se/login?url=http://www.sciencedirect.com/science/book/9781597496551
856 4 0 _uhttp://proxy.lib.ltu.se/login?url=http://site.ebrary.com/lib/lulea/docDetail.action?docID=10483470
856 4 0 _uhttp://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551
856 4 0 _uhttp://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551
856 4 0 _uhttp://sfxeu10.hosted.exlibrisgroup.com/sfxjon/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&
856 4 0 _uhttp://sfxeu10.hosted.exlibrisgroup.com/sfxkth?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&
856 4 0 _uhttp://sfxeu11.hosted.exlibrisgroup.com/sfxmiu/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&
856 4 0 _uhttp://www.dawsonera.com.db.ub.oru.se/depp/reader/protected/external/AbstractView/S9781597496568
856 4 0 _uhttps://ezproxy.bibl.hkr.se/login?url=http://site.ebrary.com/lib/kristianstad/Top?id=10483470
856 4 0 _uhttps://lt.ltag.bibl.liu.se/login?url=http://www.books24x7.com/marc.asp?bookid=44730
942 _2ddc
_cBK
999 _c209577
_d209577