In weniger als einer Minute können Sie mit dem Lesen von The Basics of Hacking and Penetration Testing auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen oder mit einer unserer kostenlosen Kindle Lese-Apps sofort zu lesen anfangen.

An Ihren Kindle oder ein anderes Gerät senden


Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden


The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [Kindle Edition]

Patrick Engebretson
5.0 von 5 Sternen  Alle Rezensionen anzeigen (2 Kundenrezensionen)

Kindle-Preis: EUR 15,83 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Kostenlose Kindle-Leseanwendung Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 15,83  
Taschenbuch EUR 21,95  



"...this is meant to be a practical book, and it positively encourages you to download, fire up and use the tools mentioned. The first chapter even tells you how to set up your own 'hacking lab'. So whatever your interest in hacking, you'll get the most out of the book if you follow along."--Network Security,Aug 1 2013 "For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need." - Network Security, December 2011


The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.


  • Format: Kindle Edition
  • Dateigröße: 2265 KB
  • Seitenzahl der Print-Ausgabe: 225 Seiten
  • Verlag: Syngress; Auflage: 2 (24. Juni 2013)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (2 Kundenrezensionen)
  • Amazon Bestseller-Rang: #114.772 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


4 Sterne
3 Sterne
2 Sterne
1 Sterne
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
5.0 von 5 Sternen The pure basics 30. Juni 2014
Von Dennis
Format:Kindle Edition|Verifizierter Kauf
This book is purely about the basics of penetration testing and ethical hacking. If you already know how to perform a basic penetration test you will probably learn nothing new. I have never read something about penetration testing nor hacking before, but I would say that now, after reading this book, I would be able to perform a simple penetration test. I do not say that I am an expert now, but I know the required steps and I am able to use the basic tools. The rest comes with further reading/learning and of course PRACTICE.
War diese Rezension für Sie hilfreich?
5.0 von 5 Sternen Das taugt was 18. Februar 2014
Format:Taschenbuch|Verifizierter Kauf
Ein billiges Buch das tatsächlich brauchbar ist (selten in diesem Fachbereich). Es quillt nicht über von Geschwafel denen es an Detail fehlt um es umzusetzen (ist schließlich kein wiss. Paper) und es gibt genaue Anleitung zum einsteigen in PenTest. Echt gut!
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf (beta) 4.5 von 5 Sternen  44 Rezensionen
13 von 13 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great book, got me hooked on pentesting 11. Februar 2014
Von Kenneth Wyser - Veröffentlicht auf
Format:Kindle Edition
As a college student majoring in computer science, I have a strong interest in security and penetration testing. After looking around for a while for a good book to get me started, I settled on The Basics of Hacking and Pentesting, and I am very glad I did so. It was a great introduction to not only the tools involved in pentesting, but the concepts and techniques behind those tools, so you actually know how and why you are doing things.

The author takes you through setting up a great testing environment, and then proceeds to introduce every step of a successful penetration test, including all the tools and techniques. After reading this book, I have not only a solid foundation on and understanding of the tools and techniques of pentesting, I now know exactly what to research and learn further so that I can master those techniques.

Overall an excellent book for anyone looking to get into security and pentesting and one I would highly recommend.
21 von 26 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great Start... (prior review is incorrect regarding Backtrack R3) 23. August 2013
Von Chris Butilier - Veröffentlicht auf
Yes, Kali Linux is the follow-up release of "Backtrack R3" from 2012, while Kali was released in ~March of 2013. Which is why you won't hear much about Backtrack, since it is now Kali. Sounds like a misinformed script kiddy who places more weight on tools than on knowledge which will get him far.... considering that this specific topic (Backtrack R3 -> Kali) is a fairly well-known fact and can be located in Google very easily. So anyone reading the initial reviewer's comment, please do not be swayed by his lack of knowledge. This is a great book that will help put you on the right track, but that track is a lot more than simply learning how to "use a tool" or running "a fill in the blank" scan, and clicking magic button. A novice approach such as what one would likely conclude from the original reviewer's lack of highly available knowledge in the field will only serve you problems should you get caught. You should always work on your own equipment and labs and/or with written and explicit authorization of the equipment of others specific to the scope of what activities will be taken. If you are serious about learning and actually entering in to the field; be forewarned it is massive and daunting, however, if you take it one step at a time and get a broad overview of the landscape first, you can begin to layout and map your path with regards to the various topics you will want to learn in the most logical manner possible. While I am far from "experienced" myself, it is a rewarding field that will likely become exponentially more rewarding and important with the growing array of expansive impacts to fields that have largely not been synonymous with Network or Information Security. For instance privacy, politics, foreign and domestic relations, government activity and oversight (or lack thereof), internal business practices and policies and will continue to further shape the way we communicate, do business and live our lives day-to-day. These impacts will likely only continue to grow, while ethical hackers and proper penetration testing is performed to maintain a balance with the ultimate goal of securing personal information, IP, and other assets.... To find more information on such paths, you can look into the various security certifications and domains of knowledge they cover as a means to get you started with some of what you will want to begin learning.... thanks to Michael for clarifying the issue. :o)
6 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen As good as it gets for a 'how to' on basic hacking 23. März 2014
Von Andy - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
The book is very readable compared to other technical books. The writer is clearly a teacher who understands how to keep a reader's attention while providing useful, real world information. As of now, this book seems very up-to-date. It as published recently and has what I have read in other resources are commonly used tools in the industry.

I read the whole book and took copious notes due to my upcoming certification tests and interest in hacking. I used the tools in at least the 1st half of the book. I will update this review once I use the tools listed in the 2nd half of the book. As the book recommended, I downloaded Oracle VMWare, Kali-Linux and Metaspoitable. Don't be intimidated by these tasks -> Oracle VMWare is a piece of cake to install, and booting up two machines with Kali (which is the attacking machine) and Metasploitable (the woefully unprotected target machine) are pretty simple, too. All of these products are free. Preparing this test bed is your key to understanding and enjoying much of the material in this book. It also allows you to 'own' a system pretty simply, so you can get a feel for the core tasks in hacking.

As an example of success using tools and instructions in this book, I used nmap, a scanner, from the Kali virtual machine against the Metasploitable virtual machine, determined a vulnerability and associated exploit, and built and executed it using Metasploit, an exploit development and delivery platform. I consider this my first hack, and although it was made a breeze to do for the sake of learning as quickly as possible, I am still proud!!! It might be awhile before I give a presentation at Defcon, though ;-)

I have been a database developer for twenty years, working in various industries such as human resources, benefits and government, so I am not new to programming, but I think someone without programming training or experience should do fine with this book. The certifications I will be taking are Certified Ethical Hacker and Offensive Security Certified Professional.
6 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Good for Beginners 26. August 2013
Von Jose Sanchez - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
I think this book is a great resource for beginners as it states. Although not completely a beginner, it is a great refresher for me to read and reference so that's wont lose the basics as I delve deeper into this field. Although you may be able to look things up online with Google as another post states, you need to know what you're looking up and this could be a good guide. This book is for beginners and not meant to further intermediary knowledge although its nice have.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen One of the best books around 21. Oktober 2013
Von Mary - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
I bought this book for a graduate level class, but I may also continue on and go for the Ethical Hacker Certification. I think this book will really help out in that arena.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden