The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test
I'm trying to get smarter about the nuts and bolts of cyberwarfare, and have always been intrigued by hacking. This is a great introduction to the basics for those who have no prior experience. The author explains how to set up a sealed lab using virtual machines, so students can practice without fear of breaking the law or causing damage, then walks through a variety of tools to conduct reconnaissance, scan networks, look for vulnerabilities, and exploit them. This book won't take you past the level of a "script kiddie" (able to employ powerful tools designed by others), but everyone has to start somewhere, and if you walk through all the exercises in this book you'll have a good foundation for further studies. The author provides some helpful suggestions for further learning.
It's rare to find a book that is flawed for being *too* practical. This surprisingly short book contains a whirlwind tour of dozens of exploitation tools and instructions for how to use them, with very little explanation of what they are actually doing, or how they work. With so little theory, it feels a bit like a crash course in how to be a script kiddie. It was useful to understand more about the plug and play tools that 95% of unsophisticated attackers use, and what these tools are capable of (a lot!), but such potentially dangerous tools and techniques supplied with so little context feels a little... icky.
Principally, This book should read by people who are interested in computer security, network security, hacking, or penetration testing. It is aimed at the people who are new to the subject of security, penetration testing, and hacking. Also, this book's vision is simple handling of the explanations. Its the main purpose of this book. So anyone who doesn't know where to start, wants to learn the security steps, wants to use the security tools can read this book. To understand this book, first of all, it is good to know operating systems and terminal commands (windows, Linux, backtrack Linux), security terms, network terms, network structure, network and tools included in the book, because to understand this book does not require any heavy knowledge. Everything is explained by how to download until how to applying. This book states that its narration is simplified in many places and also take beginners as the main target. In this way, the Author gave examples from many areas of real-life without overwhelming and boring people and used an manner of telling like coming out of a textbook and chatting with the reader. The book also explains the tools and stages it shows without going deep. So I think these features keep this book different from other books.
The main concept of the book is the phases of the penetration test. The book handled how important it is to understand, follow, and practice each stage in hacking and penetration testing. This book covered 4 methodologies which are reconnaissance, scanning, exploitation, and maintaining access. The first step in the penetration test is “reconnaissance.” The book tells how important this stage and information gathering is in the penetration test. At this stage, different types of tools and services are given as examples. The second step in the penetration test is “scanning.” At this stage, the book talked about two types of scanning and give advice for the most suitable tools. The third step in the penetration test is “exploitation.” The book talked about password resetting and password cracking and tools at this stage. The final step in the penetration test is “maintaining access.” At this stage book covered about NetCat tool and explanation of backdoors and rootkits.
This entire review has been hidden because of spoilers.
I have had a side interest in learning about penetration testing and computers for the past couple of years. It's difficult to actually find a beginner-friendly resource, especially considering material in the field quickly can become outdated. I read this text in 2020, and the book is almost 10 years old, yet I would say it has aged well. Some tools might be outdated or superseded by other software, but where the book shines is how it organizes the entire penetration/hacking process into a systematic methodology. It's simply a great bird's eye view of things. It will NOT make you a hacker or penetration tester, but it definitely gives you an idea of how the process works. If you are interested in cybersecurity or just wanting to learn more about computers in general, even if you are not wanting to be a penetration tester (I'm certainly not), this book will be great as an introduction. However, it is recommended you have some familiarity with the command line, especially the linux command line.
A very good introduction to using Kali Linux for pen testing on some open source web-based virtual machine operating systems. Well written in understandable language. Follows a well-explained logical progression of a technically complex domain. This book saved my bacon in terms of successfully passing a pens testing module examination (postgrad diploma level) I did a few years back, and opened the door to more advanced studies in this space. Please note: pen testing, or any attempt of unauthorised access to computers or networks is a criminal offence with severe penalties if caught. And, for all but the most skilled and cleverest hackers, it is not difficult to trace perpetrators. Be warned.
I purchased this book for a course I was taking for a Master's program. Before reading this, I have never "hacked" a thing in my life. I didn't even know where to start. After completing the reading of this book I was able to successfully attack another machine and get access to it (all legally of course because it was all done in a VM environment that I own). Buy the ebook now;
Nice book, giving some overview about penetration tests, explaining different phases of them and desciribing most useful tools. Definitely worth to read - it inspires to further expanding knowledge and to test the knowledge in practice.
Sometimes it was a little bit too practical for me, but you can't expect much theory in a 200 page introduction. Had fun reading it, once i really started with it
It's basic, quick, and easy to follow. Plenty of exercises to work through. There was a lot of outdated material and depricated tools, but a number of the exercises could still be done with updated tool versions. It is outdated though, so you'll fight with the book to get things done, and even then, they might not work.
Basic introduction on how to penetration test. My favorite part of the book was how to use the Internet to do reconnaissance. The basics of how to use Google to your advantage, whois, and other crafted web sites that do the work for you via search engines. The part that was most helpful was when the book discusses how Windows locks hashes for files at bootup. This is at about the halfway point in the book (Kindle Version = 49%) In the section, Local Password Cracking, the author covers the way Windows locks these hashes during boot-up. Additional steps are mentioned in this book to use a Kali boot disk to correct the hashes.
This is a really good book for those looking to research some hacking. It's also good to fill in a couple weak spots that you may have in your knowledge.
It covers some command-line stuff for applications like netcat, but not to the point your head will swim. Then it advises you to practice and develop your skills further.
At under 200 pages, it's nowhere near as intimidating for newbies (or even people who shudder at the thought of getting another 700+ page computer book.)
This is a quick and easy introduction to penetration testing and hacking using the BackTrack Linux distribution. It is expensive, too short to be of much practical use, and there are much better books out there (e.g. Counterhack by Ed Skoudis). I appreciate the need for quick, practical introductions, but this is like giving someone intent on becoming a professional chef a book of 4-ingredient recipes.
Very nice coverage over a broad range of topics. There are workbook style activities with plenty of links and referrals for deeper coverage of an area.
Excellent for a moderately savvy beginner with computing in general.
Ironically, I think a paper edition would be preferable to the e-book format as it would allow in-line notes.
This book is great for those looking to get into hacking as it follows a curriculum flow style coming in entry level but working into some much deeper concepts. It never gets too deep into a subject but always recommends books to cover a topic in complete detail. It balances entry level with detail very efficiently. A quick worthwhile read to those interested in the subject.
I quite enjoyed this book. It's written in a lively style and has a wealth of illustrations to reinforce its concepts.
Despite my novice level of experience with the more advanced concepts of computer systems, I never felt confused or out of the loop for more than a few minutes. It taught me quite a few tricks to both secure my computer systems and to test the security of them.
Ini buku tentang pentest yg paling asyik dan nyaman dibaca. Tapi ngga cuma itu, Patrick juga pinter mempersempit ruanglingkup tanpa bikin functionalitynya ikut sempit. Ruang lingkupnya diperkecil dg memakai Backtrack. Pentester adalah pekerjaan yg jadi passion saya. Enjoy
A good book. It does a good job of walking through steps, however I feel like there was a lot of re-explaining of what was going on. Not necessarily in any more detail, just different ways of explaining what was going on.
i thought I will find a lot of information in this book Especially as it speaks about the penetration test, but unfortunately generally speak about tools for penetration programs and that's all , and to be honest to your i did not take advantage of it much .. because was too simple...
Even it says basics of hacking this book has more content than the ones claiming to have advanced content. One of the best books available for an intro to white hat hacking.
Sebuah buku yang cocok untuk mengawali petualanganku di dunia Ethical Hacking dan Penetration Testing. Bahasa yang digunakan cukup sederhana dan tidak bertele-tele.