Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
This entry into the field will likely one day be considered canon where the subject of Hacking is concerned. This is one man's opinion, but I couldn't be more pleased with this book and all the help it provided in my own professional tasks.
The point of glowing rapport between myself and this book as we set about our task, was the exquisite thoroughness of this work. I knew right away I was dealing with another professional in the field who had much experience under his belt and spoke to me with that air and confidence of a well-qualified authority.
I'd many areas I needed covered so I began right away and was able to navigate easily to the various sections of the book which were most important to me and what I needed to accomplish.
Firstly I needed to go to the categories of Penetration Testing, and the various Box 'shades', along with the 'Types' of testing... and these covered the ones I wanted.
Secondly, I needed SMTP Enumeration: had that covered with a handful of areas and subareas for further breakdown.
Nextly, on to various items under the heading of Remote Exploitation-- and this section had way more than I needed, and as Exploitation covers various stages you can get into it for quite a while.
Windows, Linux, Wireless, Web... I haven't a complaint, it was all here for me and laid out with clear, easy to follow explanations. I'll rate it 5-stars & consider it a steal for Baloch's help-guide.
Covers a lot of topics but covers them poorly, does give a fairly "alright" crash course intro into penetration testing. I disliked that its smushed all of the web based hacking into the linux chapter but it does makes some sense.
only introduction stuff.. nothing new. well written guide for beginner easy to read..maybe you could see the index and jump whatever topic you like to read the fundamental.