Penetration Testing: A Hands-On Introduction to Hacking

By Georgia Weidman

Penetration testers simulate cyber assaults to discover safety weaknesses in networks, working platforms, and purposes. details defense specialists all over the world use penetration options to judge company defenses.

In Penetration Testing, safety specialist, researcher, and coach Georgia Weidman introduces you to the middle abilities and methods that each pentester wishes. utilizing a digital machine-based lab that comes with Kali Linux and weak working platforms, you are going to run via a sequence of functional classes with instruments like Wireshark, Nmap, and Burp Suite. As you stick to besides the labs and release assaults, you will adventure the major phases of an exact evaluate - together with details collecting, discovering exploitable vulnerabilities, having access to structures, submit exploitation, and more.

Learn how to:

  • Crack passwords and instant community keys with brute-forcing and wordlists
  • Test net functions for vulnerabilities
  • Use the Metasploit Framework to release exploits and write your personal Metasploit modules
  • Automate social-engineering attacks
  • Bypass antivirus software
  • Turn entry to 1 desktop into overall regulate of the company within the publish exploitation phase

You'll even discover writing your individual exploits. Then it is directly to cellular hacking - Weidman's specific sector of study - together with her instrument, the telephone Pentest Framework.

With its number of hands-on classes that conceal key instruments and techniques, Penetration Testing is the advent that each aspiring hacker needs.

Show description

Preview of Penetration Testing: A Hands-On Introduction to Hacking PDF

Similar Computing books

Robot Programming : A Practical Guide to Behavior-Based Robotics

* Teaches the recommendations of behavior-based programming via textual content, programming examples, and a different on-line simulator robotic * Explains how one can layout new behaviors through manipulating outdated ones and adjusting programming * doesn't imagine reader familiarity with robotics or programming languages * encompasses a part on designing your personal behavior-based procedure from scratch

Microsoft SQL Server 2012 A Beginners Guide 5/E

Crucial Microsoft SQL Server 2012 abilities Made effortless wake up and working on Microsoft SQL Server 2012 very quickly with support from this completely revised, useful source. jam-packed with real-world examples and hands-on workouts, Microsoft SQL Server 2012: A Beginner's advisor, 5th version begins through explaining basic relational database process techniques.

Java: The Complete Reference, Ninth Edition

The Definitive Java Programming consultant absolutely up-to-date for Java SE eight, Java: the full Reference, 9th version explains the right way to enhance, bring together, debug, and run Java courses. Bestselling programming writer Herb Schildt covers the complete Java language, together with its syntax, key words, and primary programming ideas, in addition to major parts of the Java API library.

Introduction to Cryptography with Coding Theory (2nd Edition)

With its conversational tone and useful concentration, this article mixes utilized and theoretical elements for a fantastic advent to cryptography and defense, together with the most recent major developments within the box. Assumes a minimum historical past. the extent of math sophistication is akin to a direction in linear algebra.

Extra info for Penetration Testing: A Hands-On Introduction to Hacking

Show sample text content

Nine Password assaults Password administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . on-line Password assaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wordlists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Guessing Usernames and Passwords with Hydra . . . . . . . Offline Password assaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . convalescing Password Hashes from a home windows SAM dossier . Dumping Password Hashes with actual entry . . . . . . . LM vs. NTLM Hashing Algorithms . . . . . . . . . . . . . . . . . . the difficulty with LM Password Hashes . . . . . . . . . . . . . . a hundred and eighty a hundred and eighty 181 182 183 183 186 187 188 188 189 one hundred ninety 191 193 194 196 197 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 198 199 202 203 204 206 208 209 Contents intimately  xiii John the Ripper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cracking Linux Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cracking Configuration dossier Passwords . . . . . . . . . . . . . . . . . . . . . Rainbow Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . on-line Password-Cracking providers . . . . . . . . . . . . . . . . . . . . . . . Dumping Plaintext Passwords from reminiscence with home windows Credential Editor . precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Client-Side Exploitation 215 Bypassing Filters with Metasploit Payloads . All Ports . . . . . . . . . . . . . . . . . . HTTP and HTTPS Payloads . . . . . . Client-Side assaults . . . . . . . . . . . . . . . . . Browser Exploitation . . . . . . . . . . PDF Exploits . . . . . . . . . . . . . . . Java Exploits . . . . . . . . . . . . . . . browser_autopwn . . . . . . . . . . . Winamp . . . . . . . . . . . . . . . . . precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . eleven Social Engineering The Social-Engineer Toolkit . . . . Spear-Phishing assaults . . . . . . . selecting a Payload . . atmosphere ideas . . . . . Naming Your dossier . . . . unmarried or Mass electronic mail . developing the Template surroundings the objective . . . . constructing a Listener . . net assaults . . . . . . . . . . . . . Mass e mail assaults . . . . . . . . . Multipronged assaults . . . . . . . . precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Download PDF sample

Rated 4.20 of 5 – based on 19 votes