In weniger als einer Minute können Sie mit dem Lesen von The Basics of Hacking and Penetration Testing: Ethical Ha... auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen oder mit einer unserer kostenlosen Kindle Lese-Apps sofort zu lesen anfangen.

An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) [Kindle Edition]

Patrick Engebretson
4.2 von 5 Sternen  Alle Rezensionen anzeigen (4 Kundenrezensionen)

Kindle-Preis: EUR 15,83 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Kostenlose Kindle-Leseanwendung Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 15,83  
Taschenbuch --  


Produktbeschreibungen

Pressestimmen

"Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards "Have you heard of penetration testing but have no idea what it entails? This is the perfect book to get you started, easy to read, does not assume prior knowledge, and is up-to-date. I strongly recommend Pat's latest work."--Jared DeMott, Principle Security Researcher, Crucial Security, Inc. "If you are searching for a book to get you started with penetration testing, 'The Basics of Hacking and Penetration Testing' is the right one. It assumes little and gives a lot, and doesn't require huge amounts of technical knowledge in order to be read or understood. As complex the subject may sound to novices, the author does a great job explaining it. He eschews techno-babble and when he repeatedly returns to some issues, it's because he has more to say about them, not because he can't think about what to right next."--Help Net Security "This book offers a broad overview of basic concepts of hacking and penetration testing for readers with no previous background. It outlines a four-phase model of conducting a penetration test, or an 'ethical hack,' and shows how to use such hacking tools as Backtrack Linux, Hacker Defender, and MetGooFil. A sequential example throughout the book demonstrates how the tools and phases work together. The book includes chapter introductions and summaries, b&w screenshots, examples and exercises, and recommended resources."--SciTech Book News "If you are an information security beginner with some experience in computer technology, especially networking, I would recommend this book. If you are an intermediate level pen tester or an advanced tester, you might not find this book as useful. That being said, it never hurts to browse through the book and see if any new tools or technology are mentioned here that warrant a closer look. As mentioned earlier, penetration testing is an ever growing field and it is quite possible that as an expert, you might have missed something new. This book introduces you to just enough tools and technology to get your feet wet. If this kind of testing gives you a thrill, then you might want to look into more advanced topics and resources. If this is the only resource you used to escalate your interest in pen testing, then you have no one else but the author to thank for it."--PenTest Extra Magazine Vol. 2, No. 3, June

Kurzbeschreibung

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.



  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 1455 KB
  • Seitenzahl der Print-Ausgabe: 180 Seiten
  • Verlag: Syngress; Auflage: 1 (21. Juli 2011)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B005A3K4J4
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: 4.2 von 5 Sternen  Alle Rezensionen anzeigen (4 Kundenrezensionen)
  • Amazon Bestseller-Rang: #203.074 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Kundenrezensionen

3 Sterne
0
2 Sterne
0
1 Sterne
0
4.2 von 5 Sternen
4.2 von 5 Sternen
Die hilfreichsten Kundenrezensionen
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Für den Anfang ganz nett als Überblick 9. April 2012
Von WCTFT
Format:Taschenbuch|Verifizierter Kauf
160 Seiten sind natürlich erst einmal recht mager und wenn diese dann noch großzügig mit Bildern und Zeilenabständen gestaltet werden, dann kann es leicht dünn werden.
Allerdings fand ich das Buch trotzdem sehr informativ und gut geschrieben.
Es gibt einen guten Überblick über die wichtigsten Themen des Penentrationstest und stellt dazu eine Auswahl empfehlenswerter Tools vor.
Ich kann das Buch jedem empfehlen, der genau diesen Überblick sucht, wer mehr will, der ist bei anderen Büchern (z.B. Gray Hat Hacking) besser aufgehoben.
War diese Rezension für Sie hilfreich?
4.0 von 5 Sternen Basics! 17. März 2014
Von Till S.
Format:Taschenbuch|Verifizierter Kauf
Ich habe ein bisschen mehr Detail erwartet, allerdings habe ich vielleicht das "Basics" überlesen. Es sind echt nur Basics, theoretisch erklärt. Dies aber gut. Viel gibts nicht zu sagen für Einsteiger gut, aber mal ehrlich in dieses Thema steigt man nicht mit einem Buch ein sondern nur durch ;-)

Also wer aber trozdem fürs einsteigen Bücher lesen will kanns versuchen.
War diese Rezension für Sie hilfreich?
4.0 von 5 Sternen Gute Einführung in die Thematik 1. September 2013
Von Thomas
Format:Taschenbuch|Verifizierter Kauf
Der Autor schafft es auf recht einfache Art und Weise eine Einführung in das Thema
Pen-Testing zu geben. Anschauliche Beispiele und ein gut lesbares Englisch machen
die Sache Interessant und nachvollziehbar - es werden auch konkrete Beispiele
anhand diverser Tools geschildert. Allerdings wird ein Interesse an Command-Line
Tools und dem Willen, sich damit auseinander zu setzen, vorausgesetzt. Nichts für
reine GUI Fans.
War diese Rezension für Sie hilfreich?
Format:Kindle Edition|Verifizierter Kauf
Dieses Buch hat mir sehr gut gefallen. Es ist nicht das übliche "jetzt lerne ich hacken. Los geht es mit dem Exploiten Buch" Hier werden zu aller erst die einzelnen Phasen einens Pentests erläutert und die Grundlagenn vermittellt sowie Tools genannt und erklärt, die in dieser Phase weiterhelfen. Am Ende eines Jedeen Kapitels gibt es einen Abschnitt, der dem Leser Tipps gibt, um sein Wissen in dieser Phase weiter aufzubauen. Die Tools die in diesem Buch gennannt werden sind ausschließlich Open Source Tools, die auch auf den meisten Pentesting- und Security Distributionen vorhanden sind. Dieses Buch ist wirklich empfehlenswert für Anfänger in der IT-Security Szene und weist einem dem Weg mehr zu erlernenen. Es macht regelrecht Hunger auf mehr wissen.
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.4 von 5 Sternen  75 Rezensionen
51 von 55 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent book - Delivers on the Title 15. August 2011
Von jlh - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This is a really great book that delivers on the promise described in the title. It covers the basics of hacking and penetration test and makes no assumption of prior security or hacking knowledge. This is an excellent resource for anyone looking to jumpstart his or her knowledge in this area.

The book takes the reader on a quick step-by-step journey through a penetration test beginning with Information Gathering, moving into Scanning, then Exploitation, and concluding with Report Writing. While the book does not cover any particular methodology like OSSTM or PTES it does a nice job of laying out each step in an orderly and straightforward manner. The book covers all of the major tools, in an appropriate order so the reader gets a good sense of how to run the tools and how they relate to each other.

The book gets down to business in chapter 1 and wastes no time in bringing the reader up to speed on the latest tools and techniques. One of the greatest strengths of the book is its size. Most people will be able to read through the entire book in just a few days. Another benefit of covering only the basics is that the book should have a longer shelf life. As the author points out, a Nmap Syn scan has been the same for the past 10 years.

If you're looking for an in-depth coverage of any particular tool like Nmap, Metasploit, or the like, this is not the book for you. You're better off buying a book dedicated to the tool you're interested in.

On the flip side, if you're interested in seeing the whole picture and getting a feel for how to run and use the major tools used in a basic penetration test this is a good buy.

Finally, I enjoyed the laidback and casual writing style of the author. This made the chapters easier to digest and kept me interested while still delivering enough technical meat to satisfy my knowledge and process requirements.
22 von 24 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A delicious sip of network security and PEN test 10. Oktober 2011
Von Jose - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers (or provide additional value to my Projects), network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about PEN testing tools or techniques, this book delivers what is promised on the cover and much more!

All chapters are very coherent, meticously structured and nicely integrated between each other thanks to the PEN test process it follows. There are even suggestions about how to test all the examples in a secure and practical way. Of course, a virtual lab using any of the virtualization technologies is highly advised. The author suggests VMware, I used Parallels, but there are several free tools out there including Virtual PC or VirtualBox, both are free as well.

The book uses Metasploit framework/software for its examples but makes strong emphasize on concepts rather than tools, which it is very good in my opinion because whatever is being taught can be later extrapolated using other tools. PEN test is more a process than mere scripts and tools. I also like the fact that you don't need a very strong knowledge on networking, cryptography or C++ in order to understand this book. Instead It relies on easy vocabulary with lot of examples and screen-shoots that help almost anyone who is new into this field (a basic knowledge of Linux won't hurt though, that made it easy for me to understand some commands)

-- Additional bibliography --

Once you're done with this one I recommend these two books: Metasploit: The Penetration Tester's Guide, by David Kennedy and Nmap Cookbook: The Fat-free Guide to Network Scanning. The 1st one expands a bit more on the Metasploit software and its components, which are briefly explained on the Syngress book. The Nmap cookbook, talks about nmap scanning tool and different switches you can use when working on the scanning phase; nmap cookbook is not a theory book, but visual examples of how to use the tool depending of the target or desired goal
19 von 23 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Really helped my understanding of Penetration Testing 19. August 2011
Von Frederick Schmidt - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
I work for a small company with little resources for security when it comes to protection against people with malicious intent. We run our own web and data servers and have been hacked on at least on occasion. This book really helped me learn how to test my network for weaknesses. Gave me best practice tips for protecting our servers against unwanted penetration. Most of all it showed me how little I new about how easy it was to penetrate our network even with off the shelf applications. This book is a must for small businesses trying to run big business operations.
28 von 36 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen This book is confused on what it is and what it is doing 23. März 2012
Von GK - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
Pros:
Some good introductions to ideas and tools of penetration testing.

Cons:
Not coherent or consistent at times.

This book starts and finishes well, but the middle is insufficient in information and lacks consistency. More than once in the penetration/exploit sections I had to check to see if I was missing a page. The biggest problem with coherence in the book has to do with the fact that the author explains that most pen tests will be done from the outside, but then out of nowhere switches from penetration testing to hacking a machine while actually sitting at it! The author would talk about what could be done from the outside, but then go on to how it is done from the inside (physically at the machine) with no explanation for the jump. I more than once had to check to see if I was missing a page, because the jumps were that drastic. Also many of the screen shots are not placed well, to the point where you have to stop reading and find the reference screenshot.

While there is a decent amount of good introductive information for those looking to get into or just learn about penetration testing, this book falls horribly short of what it could and should be. Bottom line, if you have no or little knowledge of penetration testing there is enough in this book to introduce you to some concepts and tools used in penetration testing. However this book is seriously lacking for anyone that is more than a novice.
6 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Interesting, Informative, and Brief - Excellent intro to Ethical Hacking 14. Februar 2012
Von Jim Johnson - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This book is a very interesting and informative read. I followed all of the steps almost verbatim and everything worked as written. The contents of the book have already been reviewed, and I don't find it necessary to regurgitate. I agree with the good reviews, this book rocks.

Here's a couple of tips:

1. Acquire a copy of Windows XP with no Service Pack (They are difficult to find, but keep looking. It is worth the wait). A pre Service Pack XP is an easy target using the steps outlined in the book. If you can't find a pre-SP XP, at least try to find one that doesn't yet have patch MS08-067. This patch makes for an easy win, which will motivate you to learn more. I think this is the patch used in the book for the example.

2. Get a computer capable of running Backtrack as the Host OS, and then proceed to load multiple Guest OSes into VMWare Player. VMWare Player is a free download from VMWare, and the best choice I have found for running virtual machines (Virtual Box is good but doesn't run multiple VMs at once). Also, you can make copies of the parent folder of the VM in order to keep a fresh, untainted copy for incredibly easy restoration after you've jacked it up.

3. Do all of the exercises in the book! It isn't enough to just read about it. You need to do it. This will make reading the book take 4 times longer but you will get 10 times more out of it. It's ok to read through the book and then go back, but my experience has shown that doing while reading is by far the more productive/efficient approach.

Have fun!
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden