Cargando…

Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.

This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn ho...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sabih, Zaid
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1048797823
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180818s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d MERUC  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO  |d UX1  |d K6U  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1048102572  |a 1175623556 
020 |a 9781788624787 
020 |a 1788624785 
020 |a 9781788622059 
020 |a 1788622057  |q (Trade Paper) 
024 3 |a 9781788622059 
029 1 |a AU@  |b 000066231793 
035 |a (OCoLC)1048797823  |z (OCoLC)1048102572  |z (OCoLC)1175623556 
037 |a B09055  |b 01201872 
050 4 |a TK5105.59  |b .S33 2018 
082 0 4 |a 005.8/7  |2 23 
049 |a UAMI 
100 1 |a Sabih, Zaid. 
245 1 0 |a Learn Ethical Hacking from Scratch :  |b Your Stepping Stone to Penetration Testing. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (549 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What's in this book?; Preparation; Penetration testing; Network penetration testing; Gaining access; Post exploitation; Website penetration testing; Protecting your system; What is hacking?; Why should we learn about hacking?; A glimpse of hacking; Browser exploitation framework; Accessing the target computer's webcam; Summary; Chapter 2: Setting Up a Lab; Lab overview; VirtualBox; Installation of VirtualBox; Installing Kali Linux; Installing Metasploitable. 
505 8 |a Installing WindowsCreating and using snapshots ; Summary; Chapter 3: Linux Basics; Overview of Kali Linux; Status bar icons; Connecting the wireless card; Linux commands; Commands; The ls command; The man command; The help command; The Tab button; Updating resources; Summary; Chapter 4: Network Penetration Testing; What is a network?; Network basics; Connecting to a wireless adapter; MAC addresses; Wireless modes -- managed and monitor; Enabling monitor mode manually; Enabling monitor mode using airmon-ng; Summary; Chapter 5: Pre-Connection Attacks; Packet sniffing basics. 
505 8 |a Targeted packet sniffing Deauthentication attack; What is a fake access point?; Creating fake access points with the MANA Toolkit; Summary; Chapter 6: Network Penetration Testing -- Gaining Access; WEP theory; Basic web cracking; Fake authentication attack; ARP request replay; WPA introduction; WPS cracking; Handshake theory; Capturing the handshake; Creating a wordlist; Wordlist cracking; Securing network from attacks; Summary; Chapter 7: Post-Connection Attacks; Post-connection attacks; The netdiscover tool; The AutoScan tool; Zenmap; Summary ; Chapter 8: Man-in-the-Middle Attacks. 
505 8 |a Man-in-the-middle attacksARP spoofing using arpspoof; ARP spoofing using MITMf; Bypassing HTTPS; Session hijacking; DNS spoofing; MITMf screenshot keylogger; MITMf code injection; MITMf against a real network; Wireshark; Wireshark basics ; Wireshark filters; Summary; Chapter 9: Network Penetration Testing, Detection, and Security; Detecting ARP poisoning; Detecting suspicious behavior; Summary; Chapter 10: Gaining Access to Computer Devices; Introduction to gaining access; Server side; Client side; Post-exploitation; Sever-side attacks; Server-side attack basics. 
505 8 |a Server-side attacks -- Metasploit basicsMetasploit remote code execution; Summary; Chapter 11: Scanning Vulnerabilities Using Tools; Installing MSFC; MSFC scan; MSFC analysis; Installing Nexpose; Running Nexpose; Nexpose analysis; Summary; Chapter 12: Client-Side Attacks; Client-side attacks; Installing Veil; Payloads overview; Generating a Veil backdoor; Listening for connections; Testing the backdoor; Fake bdm1 updates; Client-side attacks using the bdm2 BDFProxy; Protection against delivery methods; Summary; Chapter 13: Client-Side Attacks -- Social Engineering. 
500 |a Client-side attacks using social engineering. 
520 |a This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Penetration testing (Computer security) 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Tests d'intrusion. 
650 6 |a Piratage informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Network management.  |2 bicssc 
650 7 |a Networking standards & protocols.  |2 bicssc 
650 7 |a Computer networking & communications.  |2 bicssc 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Sabih, Zaid.  |t Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788622059 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5485020  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0037629805 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5485020 
938 |a YBP Library Services  |b YANK  |n 15625718 
994 |a 92  |b IZTAP