Ethical Hacking

Ethical Hacking
Author :
Publisher : No Starch Press
Total Pages : 378
Release :
ISBN-10 : 9781718501881
ISBN-13 : 1718501889
Rating : 4/5 (889 Downloads)

Book Synopsis Ethical Hacking by : Daniel G. Graham

Download or read book Ethical Hacking written by Daniel G. Graham and published by No Starch Press. This book was released on 2021-09-21 with total page 378 pages. Available in PDF, EPUB and Kindle. Book excerpt: A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network. You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.


Ethical Hacking Related Books

Ethical Hacking
Language: en
Pages: 378
Authors: Daniel G. Graham
Categories: Computers
Type: BOOK - Published: 2021-09-21 - Publisher: No Starch Press

DOWNLOAD EBOOK

A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking
Learn Ethical Hacking from Scratch
Language: en
Pages: 549
Authors: Zaid Sabih
Categories: Computers
Type: BOOK - Published: 2018-07-31 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabiliti
Hacking
Language: en
Pages: 205
Authors: Harsh Bothra
Categories: Computers
Type: BOOK - Published: 2017-06-24 - Publisher: KHANNA PUBLISHING

DOWNLOAD EBOOK

Be a Hacker with Ethics
Ethical Hacking and Penetration Testing Guide
Language: en
Pages: 524
Authors: Rafay Baloch
Categories: Computers
Type: BOOK - Published: 2017-09-29 - Publisher: CRC Press

DOWNLOAD EBOOK

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetr
Research Anthology on Advancements in Cybersecurity Education
Language: en
Pages: 578
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2021-08-27 - Publisher: IGI Global

DOWNLOAD EBOOK

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. Fro