Penetration TestingPenetration Testing
a Hands-on Introduction to Hacking
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
eBook, 2014
Current format, eBook, 2014, , Available.eBook, 2014
Current format, eBook, 2014, , Available. Offered in 0 more formatsPenetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. This book introduces the core skills and techniques that are needed. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, it runs through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. It shows the key stages of an actual assessment--including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. The reader will learn how to: crack passwords and wireless network keys with brute-forcing and wordlists; test web applications for vulnerabilities; use the Metasploit Framework to launch exploits and write Metasploit modules; automate social-engineering attacks; bypass antivirus software; turn access to one machine into total control of the enterprise in the post exploitation phase; explore mobile hacking with the author's tool, the Smartphone Pentest Framework. --
Title availability
About
Contributors
Subject and genre
Details
Publication
- San Francisco, CA : No Starch Press, c2014 (Norwood, Mass. : Books24x7.com [generator])
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
Community quotations are the opinions of contributing users. These quotations do not represent the opinions of Vancouver Public Library.
There are no quotations from this title
Community quotations are the opinions of contributing users. These quotations do not represent the opinions of Vancouver Public Library.
There are no quotations from this title
From the community