The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Β· Elsevier
3,2
162Β ΠΎΡ‚Π·ΠΈΠ²Π°
Π•Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½Π° ΠΊΠ½ΠΈΠ³Π°
180
Π‘Ρ‚Ρ€Π°Π½ΠΈΡ†ΠΈ
ΠžΡ‚Π³ΠΎΠ²Π°Ρ€Ρ Π½Π° условията

Всичко Π·Π° Ρ‚Π°Π·ΠΈ Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½Π° ΠΊΠ½ΠΈΠ³Π°

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security. The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class. This book is an ideal reference for security consultants, beginning InfoSec professionals, and students. - Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. - Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. - Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

ΠžΡ†Π΅Π½ΠΊΠΈ ΠΈ ΠΎΡ‚Π·ΠΈΠ²ΠΈ

3,2
162Β ΠΎΡ‚Π·ΠΈΠ²Π°

Π—Π° Π°Π²Ρ‚ΠΎΡ€Π°

Dr. Patrick Engebretson obtained his Doctor of Science degree with a specialization in Information Security from Dakota State University. He served as Dean of The Beacom College from 2020-2023. Prior to serving as dean, he was Chief Information Officer for East River Electric. Before joining East River, Dr. Engebretson worked for the Department of Defense, where he focused on cyber security projects. He also served as a tenured Associate Professor of Computer and Network Security, teaching undergraduate and graduate courses in information security including penetration testing, intrusion detection, exploitation, and malware. Dr. Engebretson has been invited by the Department of Homeland Security to share his research at the Software Assurance Forum in Washington, DC and has also spoken at Black Hat in Las Vegas. His research interests include penetration testing, hacking, intrusion detection, exploitation, honey pots, and malware.

ΠžΡ†Π΅Π½Π΅Ρ‚Π΅ Ρ‚Π°Π·ΠΈ Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½Π° ΠΊΠ½ΠΈΠ³Π°

ΠšΠ°ΠΆΠ΅Ρ‚Π΅ Π½ΠΈ ΠΊΠ°ΠΊΠ²ΠΎ мислитС.

Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ Π·Π° Ρ‡Π΅Ρ‚Π΅Π½Π΅Ρ‚ΠΎ

Π‘ΠΌΠ°Ρ€Ρ‚Ρ„ΠΎΠ½ΠΈ ΠΈ Ρ‚Π°Π±Π»Π΅Ρ‚ΠΈ
Π˜Π½ΡΡ‚Π°Π»ΠΈΡ€Π°ΠΉΡ‚Π΅ ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅Ρ‚ΠΎ Google Play Книги Π·Π° Android ΠΈ iPad/iPhone. Π’ΠΎ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΡ‡Π½ΠΎ сС синхронизира с ΠΏΡ€ΠΎΡ„ΠΈΠ»Π° Π²ΠΈ ΠΈ Π²ΠΈ позволява Π΄Π° Ρ‡Π΅Ρ‚Π΅Ρ‚Π΅ ΠΎΠ½Π»Π°ΠΉΠ½ ΠΈΠ»ΠΈ ΠΎΡ„Π»Π°ΠΉΠ½, ΠΊΡŠΠ΄Π΅Ρ‚ΠΎ ΠΈ Π΄Π° стС.
Π›Π°ΠΏΡ‚ΠΎΠΏΠΈ ΠΈ ΠΊΠΎΠΌΠΏΡŽΡ‚Ρ€ΠΈ
ΠœΠΎΠΆΠ΅Ρ‚Π΅ Π΄Π° ΡΠ»ΡƒΡˆΠ°Ρ‚Π΅ Π·Π°ΠΊΡƒΠΏΠ΅Π½ΠΈΡ‚Π΅ ΠΎΡ‚ Google Play Π°ΡƒΠ΄ΠΈΠΎΠΊΠ½ΠΈΠ³ΠΈ посрСдством ΡƒΠ΅Π± Π±Ρ€Π°ΡƒΠ·ΡŠΡ€Π° Π½Π° ΠΊΠΎΠΌΠΏΡŽΡ‚ΡŠΡ€Π° си.
Π•Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΠΈ Ρ‡Π΅Ρ‚Ρ†ΠΈ ΠΈ Π΄Ρ€ΡƒΠ³ΠΈ устройства
Π—Π° Π΄Π° Ρ‡Π΅Ρ‚Π΅Ρ‚Π΅ Π½Π° устройства с Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΠΎ мастило, ΠΊΠ°Ρ‚ΠΎ Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€ Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΠΈΡ‚Π΅ Ρ‡Π΅Ρ‚Ρ†ΠΈ ΠΎΡ‚ Kobo, трябва Π΄Π° ΠΈΠ·Ρ‚Π΅Π³Π»ΠΈΡ‚Π΅ Ρ„Π°ΠΉΠ» ΠΈ Π΄Π° Π³ΠΎ ΠΏΡ€Π΅Ρ…Π²ΡŠΡ€Π»ΠΈΡ‚Π΅ Π½Π° устройството си. Π˜Π·ΠΏΡŠΠ»Π½Π΅Ρ‚Π΅ ΠΏΠΎΠ΄Ρ€ΠΎΠ±Π½ΠΈΡ‚Π΅ инструкции Π² ΠŸΠΎΠΌΠΎΡ‰Π½ΠΈΡ Ρ†Π΅Π½Ρ‚ΡŠΡ€, Π·Π° Π΄Π° ΠΏΡ€Π΅Ρ…Π²ΡŠΡ€Π»ΠΈΡ‚Π΅ Ρ„Π°ΠΉΠ»ΠΎΠ²Π΅Ρ‚Π΅ Π² ΠΏΠΎΠ΄Π΄ΡŠΡ€ΠΆΠ°Π½ΠΈΡ‚Π΅ Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ½Π½ΠΈ Ρ‡Π΅Ρ‚Ρ†ΠΈ.