Professional Hacking Lab: Penetration Testing Tools and Techniques

by
Format: Paperback
Pub. Date: 2008-11-03
Publisher(s): Elsevier Science Ltd
Availability: This title is currently not available.
List Price: $69.95

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Summary

This invaluable book and DVD package is designed to replicate the experience of in-classroom, instructor-led, penetration testing training which costs the typical security professional (or their employer) $1200-$2000 for the course alone, plus T&E, and days upon days of non-billable hours. Author Justin Peltier has delivered exactly this type of penetration testing training to thousands of security professionals around the world at some of the security industry's largest and most influential events and institutions including ISC2, Computer Security Institute, and ISSA. For the first time, Justin's years of experience, training, expertise, labs, and custom-built penetration testing tools are being presented in a single Book/DVD retail product. Penetration testing is the act of testing one's own network (or that of a client) to find security vulnerabilities before these exact same holes are found and more importantly exploited by phishers, digital piracy groups, and almost countless other organized or individual malicious hackers. Just like malicious hacking, penetration testing requires a delicate balance of art, science, and guts. This is the primary reasons that penetration testing training (not just Justin's but course offered by Foundstone, EC-Council, SANS, Global Knowledge, etc) has been so successful over the years. One can't just read a book and put up a shingle as a pen tester. The road to successfully breeching the security of a network, server, or application is a dynamic chess match. To be successful at attacking or defending a network, one must be as well versed in the ever-changing strategies and tactics of their opponent as their own. This completely unique book/DVD package brings the art and science of pen testing to our readers. They will learn how to attach all major operating systems including Windows, Linux, UNIX, and OS X. In addition, they will learn to attack Web and network-based applications, databases, and network perimeters and devices. Sound tricky?...It is. Because of this, the actual business of being a pen tester is equally tricky and brings with it significant liability (i.e., you can easily break a really big, really expensive network). To satisfy this need, this package contains special chapters on running a successful and ethical penetration testing business. Included are legal guidelines along with sample reports and specification for consultants to provide to their internal and external clients. * Unique book and DVD package which for the first time delivers the art and science of penetration testing in a retail product. * Companion DVD contains custom designed penetration testing tools, a full suite of open source penetration testing tools, video walkthroughs of successful intrusions, and customizable reports and forms for conducting penetration tests. *Coverage includes open source and commercial penetration testing tools, and demonstrates network, application, Web-based, and database attacks.

Table of Contents

Why Ethical Hack
Methodologies
Linux Build
Laws and Standards
Networking, Standards, and OSI Model
Reconnaissance
Network Enumeration
Host enumeration
Trojans and Backdoors
Sniffing and session hi-jacking
Passive information gathering (Google hacking)
Active information gathering
Port scanning
Denial of Service
Social Engineering
Web Hacking
Fingerprinting Web Servers
Web Authentication
Parameter
Manipulation
SQL Injection
Cross Site Scripting
SSL Attacks
Wireless Security
Viruses and Worms
Hacking Linux
Service identification
Steganography
Vulnerability scanning
Vulnerability verification
Automated verification
Manual verification
Covert channels
Covering tracks
Port reuse
Cryptography
Netcat
Rootkits
Beast with exe or dll injection
Wireless Scanning/security of wireless
Social engineering
Database scanning
Sniffing
Defense Measures
Client exploits
http insecurities
http authorization
SSL testing
SQL injection
Robots.txt
Parameter manipulation
Cross site scripting
Countermeasures (IDS/IPS/Firewalls)
Evading Countermeasures
Exploitation
Crypto Attacks
Automation of the Compromise
Report Writing
Result Presentation
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.