Fr. 60.50

Hands on Hacking - Become an Expert At Next Gen Penetration Testing and Purple Teaming

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

A fast, hands-on introduction to offensive hacking techniques
 
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.
We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors.
 
* An introduction to the same hacking techniques that malicious hackers will use against an organization
 
* Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws
 
* Based on the tried and tested material used to train hackers all over the world in the art of breaching networks
 
* Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities
 
We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security.
 
Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.

List of contents

Foreword xviii
 
Introduction xx
 
Chapter 1 Hacking a Business Case 1
 
All Computers are Broken 2
 
The Stakes 4
 
What's Stolen and Why It's Valuable 4
 
The Internet of Vulnerable Things 4
 
Blue, Red, and Purple Teams 5
 
Blue Teams 5
 
Red Teams 5
 
Purple Teams 7
 
Hacking is Part of Your Company's Immune System 9
 
Summary 11
 
Notes 12
 
Chapter 2 Hacking Ethically and Legally 13
 
Laws That Affect Your Work 14
 
Criminal Hacking 15
 
Hacking Neighborly 15
 
Legally Gray 16
 
Penetration Testing Methodologies 17
 
Authorization 18
 
Responsible Disclosure 19
 
Bug Bounty Programs 20
 
Legal Advice and Support 21
 
Hacker House Code of Conduct 22
 
Summary 22
 
Chapter 3 Building Your Hack Box 23
 
Hardware for Hacking 24
 
Linux or BSD? 26
 
Host Operating Systems 27
 
Gentoo Linux 27
 
Arch Linux 28
 
Debian 28
 
Ubuntu 28
 
Kali Linux 29
 
Verifying Downloads 29
 
Disk Encryption 31
 
Essential Software 33
 
Firewall 34
 
Password Manager 35
 
Email 36
 
Setting Up VirtualBox 36
 
Virtualization Settings 37
 
Downloading and Installing VirtualBox 37
 
Host-Only Networking 37
 
Creating a Kali Linux VM 40
 
Creating a Virtual Hard Disk 42
 
Inserting a Virtual CD 43
 
Virtual Network Adapters 44
 
Labs 48
 
Guest Additions 51
 
Testing Your Virtual Environment 52
 
Creating Vulnerable Servers 53
 
Summary 54
 
Chapter 4 Open Source Intelligence Gathering 55
 
Does Your Client Need an OSINT Review? 56
 
What are You Looking For? 57
 
Where Do You Find It? 58
 
OSINT Tools 59
 
Grabbing Email Addresses from Google 59
 
Google Dorking the Shadows 62
 
A Brief Introduction to Passwd and Shadow Files 62
 
The Google Hacking Database 65
 
Have You Been "Pwned" Yet? 66
 
OSINT Framework Recon-ng 67
 
Recon-ng Under the Hood 74
 
Harvesting the Web 75
 
Document Metadata 76
 
Maltego 80
 
Social Media Networks 81
 
Shodan 83
 
Protecting Against OSINT 85
 
Summary 86
 
Chapter 5 The Domain Name System 87
 
The Implications of Hacking DNS 87
 
A Brief History of DNS 88
 
The DNS Hierarchy 88
 
A Basic DNS Query 89
 
Authority and Zones 92
 
DNS Resource Records 92
 
BIND9 95
 
DNS Hacking Toolkit 98
 
Finding Hosts 98
 
WHOIS 98
 
Brute-Forcing Hosts with Recon-ng 100
 
Host 101
 
Finding the SOA with Dig 102
 
Hacking a Virtual Name Server 103
 
Port Scanning with Nmap 104
 
Digging for Information 106
 
Specifying Resource Records 108
 
Information Leak CHAOS 111
 
Zone Transfer Requests 113
 
Information-Gathering Tools 114
 
Fierce 115
 
Dnsrecon 116
 
Dnsenum 116
 
Searching for Vulnerabilities and Exploits 118
 
Searchsploit 118
 
Other Sources 119
 
DNS Traffic Amplification 120
 
Metasploit 121
 
Carrying Out a Denial-of-Service Attack 125
 
DoS Attacks with Metasploit 126
 
DNS Spoofi ng 128
 
DNS Cache Poisoning 129
 
DNS Cache Snooping 131
 
DNSSEC 131
 

About the author










MATTHEW HICKEY is an expert in offensive security testing, discovering vulnerabilities used by malicious attackers, as well as a developer of exploits and security testing tools. He is a co-founder of Hacker House. JENNIFER ARCURI is an entrepreneur, public speaker and Certified Ethical Hacker. She is the CEO and founder of Hacker House.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.