Jump to ratings and reviews
Rate this book

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Rate this book
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

159 pages, Paperback

First published July 1, 2011

177 people are currently reading
1394 people want to read

About the author

Patrick Engebretson

5 books7 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
244 (33%)
4 stars
263 (36%)
3 stars
150 (20%)
2 stars
40 (5%)
1 star
25 (3%)
Displaying 1 - 30 of 30 reviews
Profile Image for Mark Jacobsen.
Author 6 books28 followers
March 13, 2013
I'm trying to get smarter about the nuts and bolts of cyberwarfare, and have always been intrigued by hacking. This is a great introduction to the basics for those who have no prior experience. The author explains how to set up a sealed lab using virtual machines, so students can practice without fear of breaking the law or causing damage, then walks through a variety of tools to conduct reconnaissance, scan networks, look for vulnerabilities, and exploit them. This book won't take you past the level of a "script kiddie" (able to employ powerful tools designed by others), but everyone has to start somewhere, and if you walk through all the exercises in this book you'll have a good foundation for further studies. The author provides some helpful suggestions for further learning.
Profile Image for Natasha Postolovski.
5 reviews4 followers
December 20, 2016
It's rare to find a book that is flawed for being *too* practical. This surprisingly short book contains a whirlwind tour of dozens of exploitation tools and instructions for how to use them, with very little explanation of what they are actually doing, or how they work. With so little theory, it feels a bit like a crash course in how to be a script kiddie. It was useful to understand more about the plug and play tools that 95% of unsophisticated attackers use, and what these tools are capable of (a lot!), but such potentially dangerous tools and techniques supplied with so little context feels a little... icky.
Profile Image for Acc13.
73 reviews7 followers
July 29, 2016
Good for those starting from complete ground zero - no coding skills, never heard of Kali Linux.

Others, look elsewhere.
1 review
May 3, 2020
Principally, This book should read by people who are interested in computer security, network security, hacking, or penetration testing. It is aimed at the people who are new to the subject of security, penetration testing, and hacking. Also, this book's vision is simple handling of the explanations. Its the main purpose of this book. So anyone who doesn't know where to start, wants to learn the security steps, wants to use the security tools can read this book. To understand this book, first of all, it is good to know operating systems and terminal commands (windows, Linux, backtrack Linux), security terms, network terms, network structure, network and tools included in the book, because to understand this book does not require any heavy knowledge. Everything is explained by how to download until how to applying. This book states that its narration is simplified in many places and also take beginners as the main target. In this way, the Author gave examples from many areas of real-life without overwhelming and boring people and used an manner of telling like coming out of a textbook and chatting with the reader. The book also explains the tools and stages it shows without going deep. So I think these features keep this book different from other books.

The main concept of the book is the phases of the penetration test. The book handled how important it is to understand, follow, and practice each stage in hacking and penetration testing. This book covered 4 methodologies which are reconnaissance, scanning, exploitation, and maintaining access. The first step in the penetration test is “reconnaissance.” The book tells how important this stage and information gathering is in the penetration test. At this stage, different types of tools and services are given as examples. The second step in the penetration test is “scanning.” At this stage, the book talked about two types of scanning and give advice for the most suitable tools. The third step in the penetration test is “exploitation.” The book talked about password resetting and password cracking and tools at this stage. The final step in the penetration test is “maintaining access.” At this stage book covered about NetCat tool and explanation of backdoors and rootkits.
This entire review has been hidden because of spoilers.
7 reviews1 follower
October 3, 2020
I have had a side interest in learning about penetration testing and computers for the past couple of years. It's difficult to actually find a beginner-friendly resource, especially considering material in the field quickly can become outdated. I read this text in 2020, and the book is almost 10 years old, yet I would say it has aged well. Some tools might be outdated or superseded by other software, but where the book shines is how it organizes the entire penetration/hacking process into a systematic methodology. It's simply a great bird's eye view of things. It will NOT make you a hacker or penetration tester, but it definitely gives you an idea of how the process works. If you are interested in cybersecurity or just wanting to learn more about computers in general, even if you are not wanting to be a penetration tester (I'm certainly not), this book will be great as an introduction. However, it is recommended you have some familiarity with the command line, especially the linux command line.
Profile Image for George.
23 reviews
April 8, 2021
A very good introduction to using Kali Linux for pen testing on some open source web-based virtual machine operating systems. Well written in understandable language. Follows a well-explained logical progression of a technically complex domain. This book saved my bacon in terms of successfully passing a pens testing module examination (postgrad diploma level) I did a few years back, and opened the door to more advanced studies in this space. Please note: pen testing, or any attempt of unauthorised access to computers or networks is a criminal offence with severe penalties if caught. And, for all but the most skilled and cleverest hackers, it is not difficult to trace perpetrators. Be warned.
Profile Image for Bookich Store.
80 reviews
April 15, 2021
I purchased this book for a course I was taking for a Master's program. Before reading this, I have never "hacked" a thing in my life. I didn't even know where to start. After completing the reading of this book I was able to successfully attack another machine and get access to it (all legally of course because it was all done in a VM environment that I own).
Buy the ebook now;

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy 2nd Edition
Profile Image for Krzyś Dz.
58 reviews
February 28, 2018
Nice book, giving some overview about penetration tests, explaining different phases of them and desciribing most useful tools. Definitely worth to read - it inspires to further expanding knowledge and to test the knowledge in practice.
13 reviews
November 13, 2018
Great basic book for hacking and pen testing. Lots of useful and practical information. Easy to read and follow.
Profile Image for Evropa Thanathos.
18 reviews1 follower
March 18, 2019
Sometimes it was a little bit too practical for me, but you can't expect much theory in a 200 page introduction.
Had fun reading it, once i really started with it
1 review
Read
June 20, 2021
hmm its good book for beginners ...got to learn a lot...basics is very important....
17 reviews
March 10, 2022
This book was my best introduction to the ethical hacking, I read it years ago and now I found it in my library and read it again!
Profile Image for Jon.
390 reviews
May 18, 2021
It's basic, quick, and easy to follow. Plenty of exercises to work through. There was a lot of outdated material and depricated tools, but a number of the exercises could still be done with updated tool versions. It is outdated though, so you'll fight with the book to get things done, and even then, they might not work.
Profile Image for Beck Frost.
313 reviews14 followers
February 2, 2016
Basic introduction on how to penetration test. My favorite part of the book was how to use the Internet to do reconnaissance. The basics of how to use Google to your advantage, whois, and other crafted web sites that do the work for you via search engines. The part that was most helpful was when the book discusses how Windows locks hashes for files at bootup. This is at about the halfway point in the book (Kindle Version = 49%) In the section, Local Password Cracking, the author covers the way Windows locks these hashes during boot-up. Additional steps are mentioned in this book to use a Kali boot disk to correct the hashes.
Profile Image for Warren.
Author 3 books6 followers
July 7, 2012
This is a really good book for those looking to research some hacking. It's also good to fill in a couple weak spots that you may have in your knowledge.

It covers some command-line stuff for applications like netcat, but not to the point your head will swim. Then it advises you to practice and develop your skills further.

At under 200 pages, it's nowhere near as intimidating for newbies (or even people who shudder at the thought of getting another 700+ page computer book.)
Profile Image for Brian Powell.
195 reviews34 followers
November 20, 2016
This is a quick and easy introduction to penetration testing and hacking using the BackTrack Linux distribution. It is expensive, too short to be of much practical use, and there are much better books out there (e.g. Counterhack by Ed Skoudis). I appreciate the need for quick, practical introductions, but this is like giving someone intent on becoming a professional chef a book of 4-ingredient recipes.
Profile Image for Sal Coraccio.
166 reviews17 followers
December 16, 2012
Very nice coverage over a broad range of topics. There are workbook style activities with plenty of links and referrals for deeper coverage of an area.

Excellent for a moderately savvy beginner with computing in general.

Ironically, I think a paper edition would be preferable to the e-book format as it would allow in-line notes.
1 review
March 13, 2013
This book is great for those looking to get into hacking as it follows a curriculum flow style coming in entry level but working into some much deeper concepts. It never gets too deep into a subject but always recommends books to cover a topic in complete detail. It balances entry level with detail very efficiently. A quick worthwhile read to those interested in the subject.
10 reviews
March 1, 2013
I quite enjoyed this book. It's written in a lively style and has a wealth of illustrations to reinforce its concepts.

Despite my novice level of experience with the more advanced concepts of computer systems, I never felt confused or out of the loop for more than a few minutes. It taught me quite a few tricks to both secure my computer systems and to test the security of them.
Profile Image for Nawasandi.
113 reviews9 followers
March 31, 2013
Ini buku tentang pentest yg paling asyik dan nyaman dibaca. Tapi ngga cuma itu, Patrick juga pinter mempersempit ruanglingkup tanpa bikin functionalitynya ikut sempit. Ruang lingkupnya diperkecil dg memakai Backtrack. Pentester adalah pekerjaan yg jadi passion saya. Enjoy
3 reviews2 followers
August 16, 2013
A good book. It does a good job of walking through steps, however I feel like there was a lot of re-explaining of what was going on. Not necessarily in any more detail, just different ways of explaining what was going on.
Profile Image for F.
93 reviews9 followers
September 20, 2013
i thought I will find a lot of information in this book
Especially as it speaks about the penetration test, but unfortunately generally speak about tools for penetration programs and that's all , and to be honest to your i did not take advantage of it much .. because was too simple...
10 reviews1 follower
August 21, 2014
Gives a well-rounded introduction to penetration testing.

Suitable for those without any penetration testing background - starting from ground zero.

More of an introduction to penetration testing and not basics.
2 reviews
January 26, 2014
Basically it's an easy book. u can take it as your first and good start step. Actualy I spend my free times in reading and trying this book.
4 reviews1 follower
August 13, 2014
Gave up reading it and bought the new edition, because this book refers to Backtrack Linux which is no longer supported or available.
Profile Image for Fuat .
22 reviews
August 4, 2014
Even it says basics of hacking this book has more content than the ones claiming to have advanced content. One of the best books available for an intro to white hat hacking.
Profile Image for Agung Gumilang.
3 reviews2 followers
April 18, 2016
Sebuah buku yang cocok untuk mengawali petualanganku di dunia Ethical Hacking dan Penetration Testing. Bahasa yang digunakan cukup sederhana dan tidak bertele-tele.
Profile Image for Çağdaş .
37 reviews3 followers
October 27, 2019
I thought I was going to be a hacker when I've read this but I haven't :((
Displaying 1 - 30 of 30 reviews

Can't find what you're looking for?

Get help and learn more about the design.