Share
Fr. 60.50
Jennifer Arcuri, Matthew Hickey, Matthew (Hacker House) Arcuri Hickey
Hands on Hacking - Become an Expert At Next Gen Penetration Testing and Purple Teaming
English · Paperback / Softback
Shipping usually within 1 to 3 weeks (not available at short notice)
Description
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.
We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors.
* An introduction to the same hacking techniques that malicious hackers will use against an organization
* Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws
* Based on the tried and tested material used to train hackers all over the world in the art of breaching networks
* Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities
We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security.
Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
List of contents
Foreword xviii
Introduction xx
Chapter 1 Hacking a Business Case 1
All Computers are Broken 2
The Stakes 4
What's Stolen and Why It's Valuable 4
The Internet of Vulnerable Things 4
Blue, Red, and Purple Teams 5
Blue Teams 5
Red Teams 5
Purple Teams 7
Hacking is Part of Your Company's Immune System 9
Summary 11
Notes 12
Chapter 2 Hacking Ethically and Legally 13
Laws That Affect Your Work 14
Criminal Hacking 15
Hacking Neighborly 15
Legally Gray 16
Penetration Testing Methodologies 17
Authorization 18
Responsible Disclosure 19
Bug Bounty Programs 20
Legal Advice and Support 21
Hacker House Code of Conduct 22
Summary 22
Chapter 3 Building Your Hack Box 23
Hardware for Hacking 24
Linux or BSD? 26
Host Operating Systems 27
Gentoo Linux 27
Arch Linux 28
Debian 28
Ubuntu 28
Kali Linux 29
Verifying Downloads 29
Disk Encryption 31
Essential Software 33
Firewall 34
Password Manager 35
Email 36
Setting Up VirtualBox 36
Virtualization Settings 37
Downloading and Installing VirtualBox 37
Host-Only Networking 37
Creating a Kali Linux VM 40
Creating a Virtual Hard Disk 42
Inserting a Virtual CD 43
Virtual Network Adapters 44
Labs 48
Guest Additions 51
Testing Your Virtual Environment 52
Creating Vulnerable Servers 53
Summary 54
Chapter 4 Open Source Intelligence Gathering 55
Does Your Client Need an OSINT Review? 56
What are You Looking For? 57
Where Do You Find It? 58
OSINT Tools 59
Grabbing Email Addresses from Google 59
Google Dorking the Shadows 62
A Brief Introduction to Passwd and Shadow Files 62
The Google Hacking Database 65
Have You Been "Pwned" Yet? 66
OSINT Framework Recon-ng 67
Recon-ng Under the Hood 74
Harvesting the Web 75
Document Metadata 76
Maltego 80
Social Media Networks 81
Shodan 83
Protecting Against OSINT 85
Summary 86
Chapter 5 The Domain Name System 87
The Implications of Hacking DNS 87
A Brief History of DNS 88
The DNS Hierarchy 88
A Basic DNS Query 89
Authority and Zones 92
DNS Resource Records 92
BIND9 95
DNS Hacking Toolkit 98
Finding Hosts 98
WHOIS 98
Brute-Forcing Hosts with Recon-ng 100
Host 101
Finding the SOA with Dig 102
Hacking a Virtual Name Server 103
Port Scanning with Nmap 104
Digging for Information 106
Specifying Resource Records 108
Information Leak CHAOS 111
Zone Transfer Requests 113
Information-Gathering Tools 114
Fierce 115
Dnsrecon 116
Dnsenum 116
Searching for Vulnerabilities and Exploits 118
Searchsploit 118
Other Sources 119
DNS Traffic Amplification 120
Metasploit 121
Carrying Out a Denial-of-Service Attack 125
DoS Attacks with Metasploit 126
DNS Spoofi ng 128
DNS Cache Poisoning 129
DNS Cache Snooping 131
DNSSEC 131
About the author
MATTHEW HICKEY is an expert in offensive security testing, discovering vulnerabilities used by malicious attackers, as well as a developer of exploits and security testing tools. He is a co-founder of Hacker House. JENNIFER ARCURI is an entrepreneur, public speaker and Certified Ethical Hacker. She is the CEO and founder of Hacker House.
Product details
| Authors | Jennifer Arcuri, Matthew Hickey, Matthew (Hacker House) Arcuri Hickey |
| Publisher | Wiley, John and Sons Ltd |
| Languages | English |
| Product format | Paperback / Softback |
| Released | 04.09.2020 |
| EAN | 9781119561453 |
| ISBN | 978-1-119-56145-3 |
| No. of pages | 608 |
| Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
> Data communication, networks
Computersicherheit, Informatik, Netzwerk, Netzwerksicherheit, Hacken, Hacking, computer science, Computer Security & Cryptography, Computersicherheit u. Kryptographie, Networking / Security, Netzwerke / Sicherheit |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.