Family Bundle Save on Automotive Parts During October Best Books of October Men's Clothing Men's Clothing Trend Shop All Men's Clothing Cloud Drive Photos U2 Amazon Fire Phone, now just $0.99 with a two-year contract Amazon Fire TV Amazon Wine  Starter Kit Bundle The Walking Dead The Walking Dead The Walking Dead Fire tablets Kindle Voyage GNO New Arrivals in Sports & Outdoors Shop now
Start reading The Basics of Hacking and Penetration Testing on the free Kindle Reading App or on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here.
Programming Books C Java PHP Python Learn more Browse Programming Books

Deliver to your Kindle or other device

Enter a promotion code
or gift card
 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [Kindle Edition]

Patrick Engebretson
4.5 out of 5 stars  See all reviews (40 customer reviews)

Digital List Price: $29.95 What's this?
Print List Price: $29.95
Kindle Price: $16.17
You Save: $13.78 (46%)

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your email address or mobile phone number.

Formats

Amazon Price New from Used from
Kindle Edition $16.17  
Paperback $21.39  
Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Book Description

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.



  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.


Editorial Reviews

Review

"I would say that this book is by far one of the best books I have read on the topic of introducing penetration testing to those looking to make a career of it. it would be a great reference title to keep on your shelf for not only aspiring network penetration testers but also for those internal employees tasked with either hiring an outside firm or performing their own annual test."--The Ethical Hacker Network online, December 19, 2013 "Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards "Have you heard of penetration testing but have no idea what it entails? This is the perfect book to get you started, easy to read, does not assume prior knowledge, and is up-to-date. I strongly recommend Pat's latest work."--Jared DeMott, Principle Security Researcher, Crucial Security, Inc. "If you are searching for a book to get you started with penetration testing, 'The Basics of Hacking and Penetration Testing' is the right one. It assumes little and gives a lot, and doesn't require huge amounts of technical knowledge in order to be read or understood. As complex the subject may sound to novices, the author does a great job explaining it. He eschews techno-babble and when he repeatedly returns to some issues, it's because he has more to say about them, not because he can't think about what to right next."--Help Net Security "This book offers a broad overview of basic concepts of hacking and penetration testing for readers with no previous background. It outlines a four-phase model of conducting a penetration test, or an 'ethical hack,' and shows how to use such hacking tools as Backtrack Linux, Hacker Defender, and MetGooFil. A sequential example throughout the book demonstrates how the tools and phases work together. The book includes chapter introductions and summaries, b&w screenshots, examples and exercises, and recommended resources."--SciTech Book News "If you are an information security beginner with some experience in computer technology, especially networking, I would recommend this book. If you are an intermediate level pen tester or an advanced tester, you might not find this book as useful. That being said, it never hurts to browse through the book and see if any new tools or technology are mentioned here that warrant a closer look. As mentioned earlier, penetration testing is an ever growing field and it is quite possible that as an expert, you might have missed something new. This book introduces you to just enough tools and technology to get your feet wet. If this kind of testing gives you a thrill, then you might want to look into more advanced topics and resources. If this is the only resource you used to escalate your interest in pen testing, then you have no one else but the author to thank for it."--PenTest Extra Magazine Vol. 2, No. 3, June

From the Back Cover

The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step methodology for conducting a penetration test or hack.  You will be provided with the know-how required to jump start your career or gain a better understanding of offensive security. The book walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases function and relate.
·      
  • The second edition includes updated information covering Kali Linux as well as focusing on the seminal tools required to complete a penetration test 
  • New tools added including the Social Engineer Toolkit, Meterpreter, w3af and more!
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
  • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University

Product Details

  • File Size: 2265 KB
  • Print Length: 225 pages
  • Publisher: Syngress; 2 edition (June 24, 2013)
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B00DSNSQAC
  • Text-to-Speech: Enabled
  • X-Ray:
  • Lending: Not Enabled
  • Amazon Best Sellers Rank: #54,004 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price? .


Customer Reviews

Most Helpful Customer Reviews
9 of 9 people found the following review helpful
5.0 out of 5 stars Great book, got me hooked on pentesting February 11, 2014
Format:Kindle Edition
As a college student majoring in computer science, I have a strong interest in security and penetration testing. After looking around for a while for a good book to get me started, I settled on The Basics of Hacking and Pentesting, and I am very glad I did so. It was a great introduction to not only the tools involved in pentesting, but the concepts and techniques behind those tools, so you actually know how and why you are doing things.

The author takes you through setting up a great testing environment, and then proceeds to introduce every step of a successful penetration test, including all the tools and techniques. After reading this book, I have not only a solid foundation on and understanding of the tools and techniques of pentesting, I now know exactly what to research and learn further so that I can master those techniques.

Overall an excellent book for anyone looking to get into security and pentesting and one I would highly recommend.
Comment | 
Was this review helpful to you?
15 of 19 people found the following review helpful
Format:Paperback
Yes, Kali Linux is the follow-up release of "Backtrack R3" from 2012, while Kali was released in ~March of 2013. Which is why you won't hear much about Backtrack, since it is now Kali. Sounds like a misinformed script kiddy who places more weight on tools than on knowledge which will get him far.... considering that this specific topic (Backtrack R3 -> Kali) is a fairly well-known fact and can be located in Google very easily. So anyone reading the initial reviewer's comment, please do not be swayed by his lack of knowledge. This is a great book that will help put you on the right track, but that track is a lot more than simply learning how to "use a tool" or running "a fill in the blank" scan, and clicking magic button. A novice approach such as what one would likely conclude from the original reviewer's lack of highly available knowledge in the field will only serve you problems should you get caught. You should always work on your own equipment and labs and/or with written and explicit authorization of the equipment of others specific to the scope of what activities will be taken. If you are serious about learning and actually entering in to the field; be forewarned it is massive and daunting, however, if you take it one step at a time and get a broad overview of the landscape first, you can begin to layout and map your path with regards to the various topics you will want to learn in the most logical manner possible. While I am far from "experienced" myself, it is a rewarding field that will likely become exponentially more rewarding and important with the growing array of expansive impacts to fields that have largely not been synonymous with Network or Information Security. Read more ›
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars As good as it gets for a 'how to' on basic hacking March 22, 2014
By Andy
Format:Paperback|Verified Purchase
The book is very readable compared to other technical books. The writer is clearly a teacher who understands how to keep a reader's attention while providing useful, real world information. As of now, this book seems very up-to-date. It as published recently and has what I have read in other resources are commonly used tools in the industry.

I read the whole book and took copious notes due to my upcoming certification tests and interest in hacking. I used the tools in at least the 1st half of the book. I will update this review once I use the tools listed in the 2nd half of the book. As the book recommended, I downloaded Oracle VMWare, Kali-Linux and Metaspoitable. Don't be intimidated by these tasks -> Oracle VMWare is a piece of cake to install, and booting up two machines with Kali (which is the attacking machine) and Metasploitable (the woefully unprotected target machine) are pretty simple, too. All of these products are free. Preparing this test bed is your key to understanding and enjoying much of the material in this book. It also allows you to 'own' a system pretty simply, so you can get a feel for the core tasks in hacking.

As an example of success using tools and instructions in this book, I used nmap, a scanner, from the Kali virtual machine against the Metasploitable virtual machine, determined a vulnerability and associated exploit, and built and executed it using Metasploit, an exploit development and delivery platform. I consider this my first hack, and although it was made a breeze to do for the sake of learning as quickly as possible, I am still proud!!!
Read more ›
Was this review helpful to you?
4 of 5 people found the following review helpful
5.0 out of 5 stars Good for Beginners August 25, 2013
Format:Paperback|Verified Purchase
I think this book is a great resource for beginners as it states. Although not completely a beginner, it is a great refresher for me to read and reference so that's wont lose the basics as I delve deeper into this field. Although you may be able to look things up online with Google as another post states, you need to know what you're looking up and this could be a good guide. This book is for beginners and not meant to further intermediary knowledge although its nice have.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
5.0 out of 5 stars One of the best books around October 21, 2013
By Mary
Format:Paperback|Verified Purchase
I bought this book for a graduate level class, but I may also continue on and go for the Ethical Hacker Certification. I think this book will really help out in that arena.
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
4.0 out of 5 stars Great general overview - best for beginners
This is a very good introduction to a method of penetration testing. It's called "basics" for a reason. Read more
Published 12 days ago by cirrocumulus
5.0 out of 5 stars worth buying
Amazing book for both newbies and those who are a step above them. Easy description on how to use tools and the theory around them.
Published 28 days ago by Stepan Maluchev
5.0 out of 5 stars Great read!
As someone looking to get more into computer and network security, I found this be a great read. The author did a wonderful job covering each of the penetration testing steps and... Read more
Published 1 month ago by Ryan
5.0 out of 5 stars Five Stars
very good introductory pen test book.
Published 1 month ago by Suranjit Paul
5.0 out of 5 stars Five Stars
Very informative!
Published 1 month ago by Daniel Kovacs
5.0 out of 5 stars Great for a beginner..
Nice little textbook, worth the price.
Published 1 month ago by Farrell G.
4.0 out of 5 stars Recomended
Nice for beginners really approach topics viewed at CEH
Published 1 month ago by Julio
3.0 out of 5 stars author doesn't lie - covers the basics
The author doesn't lie that this book covers is the BASICS of hacking and pen testing. I am just starting out in the security field of IT and after reading this book I didn't get... Read more
Published 1 month ago by K. Bryant
5.0 out of 5 stars Five Stars
Great book!
Published 2 months ago by Robert J Honomichl
5.0 out of 5 stars This book is a great source to walk you through from beginning to end...
This book is a great source to walk you through from beginning to end of a Penetration Test. Beginners and advanced users alike will learn from this book
Published 2 months ago by Joshua Philip Coppola
Search Customer Reviews
Search these reviews only

What Other Items Do Customers Buy After Viewing This Item?


Forums


Look for Similar Items by Category