Programming Books C Java PHP Python Learn more Browse Programming Books

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 
Due Date: Dec 19, 2014

FREE return shipping at the end of the semester.

Access codes and supplements are not guaranteed with rentals.
 
   
Sell Us Your Item
For a $6.57 Gift Card
Trade in
Kindle Edition
Read instantly on your iPad, PC, Mac, Android tablet or Kindle Fire
Buy Price: $16.33
Rent From: $6.63
 
 
 
Have one to sell? Sell yours here

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) [Paperback]

Patrick Engebretson
4.4 out of 5 stars  See all reviews (73 customer reviews)

Rent
$17.00
In Stock.
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
 
Kindle Edition
Rent from
$16.33
$6.63
 
Paperback --  
Paperback, August 4, 2011 --  
Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now
There is a newer edition of this item:
The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy 4.5 out of 5 stars (28)
$20.27
In Stock.

Book Description

August 4, 2011 1597496553 978-1597496551 1

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.


Editorial Reviews

Review

"Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards

"Have you heard of penetration testing but have no idea what it entails? This is the perfect book to get you started, easy to read, does not assume prior knowledge, and is up-to-date. I strongly recommend Pat's latest work."--Jared DeMott, Principle Security Researcher, Crucial Security, Inc.

"If you are searching for a book to get you started with penetration testing, 'The Basics of Hacking and Penetration Testing' is the right one. It assumes little and gives a lot, and doesn't require huge amounts of technical knowledge in order to be read or understood. As complex the subject may sound to novices, the author does a great job explaining it. He eschews techno-babble and when he repeatedly returns to some issues, it's because he has more to say about them, not because he can't think about what to right next."--Help Net Security

"This book offers a broad overview of basic concepts of hacking and penetration testing for readers with no previous background. It outlines a four-phase model of conducting a penetration test, or an 'ethical hack,' and shows how to use such hacking tools as Backtrack Linux, Hacker Defender, and MetGooFil. A sequential example throughout the book demonstrates how the tools and phases work together. The book includes chapter introductions and summaries, b&w screenshots, examples and exercises, and recommended resources."--SciTech Book News

"If you are an information security beginner with some experience in computer technology, especially networking, I would recommend this book. If you are an intermediate level pen tester or an advanced tester, you might not find this book as useful. That being said, it never hurts to browse through the book and see if any new tools or technology are mentioned here that warrant a closer look. As mentioned earlier, penetration testing is an ever growing field and it is quite possible that as an expert, you might have missed something new. This book introduces you to just enough tools and technology to get your feet wet. If this kind of testing gives you a thrill, then you might want to look into more advanced topics and resources. If this is the only resource you used to escalate your interest in pen testing, then you have no one else but the author to thank for it."--PenTest Extra Magazine Vol. 2, No. 3, June

From the Back Cover

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.

    • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
    • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
    • Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Product Details

  • Series: Syngress Basics Series
  • Paperback: 180 pages
  • Publisher: Syngress; 1 edition (August 4, 2011)
  • Language: English
  • ISBN-10: 1597496553
  • ISBN-13: 978-1597496551
  • Product Dimensions: 0.6 x 7.3 x 9 inches
  • Shipping Weight: 1 pounds
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (73 customer reviews)
  • Amazon Best Sellers Rank: #208,043 in Books (See Top 100 in Books)

More About the Author

Father. Husband. Professor. Hacker. Pen Tester. And now author!

Born in northern Minnesota, undergraduate at North Dakota State University, Masters and Doctorate at Dakota State University.

Customer Reviews

Most Helpful Customer Reviews
51 of 55 people found the following review helpful
5.0 out of 5 stars Excellent book - Delivers on the Title August 15, 2011
By jlh
Format:Paperback|Verified Purchase
This is a really great book that delivers on the promise described in the title. It covers the basics of hacking and penetration test and makes no assumption of prior security or hacking knowledge. This is an excellent resource for anyone looking to jumpstart his or her knowledge in this area.

The book takes the reader on a quick step-by-step journey through a penetration test beginning with Information Gathering, moving into Scanning, then Exploitation, and concluding with Report Writing. While the book does not cover any particular methodology like OSSTM or PTES it does a nice job of laying out each step in an orderly and straightforward manner. The book covers all of the major tools, in an appropriate order so the reader gets a good sense of how to run the tools and how they relate to each other.

The book gets down to business in chapter 1 and wastes no time in bringing the reader up to speed on the latest tools and techniques. One of the greatest strengths of the book is its size. Most people will be able to read through the entire book in just a few days. Another benefit of covering only the basics is that the book should have a longer shelf life. As the author points out, a Nmap Syn scan has been the same for the past 10 years.

If you're looking for an in-depth coverage of any particular tool like Nmap, Metasploit, or the like, this is not the book for you. You're better off buying a book dedicated to the tool you're interested in.

On the flip side, if you're interested in seeing the whole picture and getting a feel for how to run and use the major tools used in a basic penetration test this is a good buy.

Finally, I enjoyed the laidback and casual writing style of the author. This made the chapters easier to digest and kept me interested while still delivering enough technical meat to satisfy my knowledge and process requirements.
Was this review helpful to you?
22 of 24 people found the following review helpful
5.0 out of 5 stars A delicious sip of network security and PEN test October 10, 2011
By Jose
Format:Paperback|Verified Purchase
Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers (or provide additional value to my Projects), network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about PEN testing tools or techniques, this book delivers what is promised on the cover and much more!

All chapters are very coherent, meticously structured and nicely integrated between each other thanks to the PEN test process it follows. There are even suggestions about how to test all the examples in a secure and practical way. Of course, a virtual lab using any of the virtualization technologies is highly advised. The author suggests VMware, I used Parallels, but there are several free tools out there including Virtual PC or VirtualBox, both are free as well.

The book uses Metasploit framework/software for its examples but makes strong emphasize on concepts rather than tools, which it is very good in my opinion because whatever is being taught can be later extrapolated using other tools. PEN test is more a process than mere scripts and tools. I also like the fact that you don't need a very strong knowledge on networking, cryptography or C++ in order to understand this book.
Read more ›
Comment | 
Was this review helpful to you?
19 of 23 people found the following review helpful
5.0 out of 5 stars Really helped my understanding of Penetration Testing August 19, 2011
Format:Paperback|Verified Purchase
I work for a small company with little resources for security when it comes to protection against people with malicious intent. We run our own web and data servers and have been hacked on at least on occasion. This book really helped me learn how to test my network for weaknesses. Gave me best practice tips for protecting our servers against unwanted penetration. Most of all it showed me how little I new about how easy it was to penetrate our network even with off the shelf applications. This book is a must for small businesses trying to run big business operations.
Comment | 
Was this review helpful to you?
28 of 36 people found the following review helpful
By GK
Format:Paperback|Verified Purchase
Pros:
Some good introductions to ideas and tools of penetration testing.

Cons:
Not coherent or consistent at times.

This book starts and finishes well, but the middle is insufficient in information and lacks consistency. More than once in the penetration/exploit sections I had to check to see if I was missing a page. The biggest problem with coherence in the book has to do with the fact that the author explains that most pen tests will be done from the outside, but then out of nowhere switches from penetration testing to hacking a machine while actually sitting at it! The author would talk about what could be done from the outside, but then go on to how it is done from the inside (physically at the machine) with no explanation for the jump. I more than once had to check to see if I was missing a page, because the jumps were that drastic. Also many of the screen shots are not placed well, to the point where you have to stop reading and find the reference screenshot.

While there is a decent amount of good introductive information for those looking to get into or just learn about penetration testing, this book falls horribly short of what it could and should be. Bottom line, if you have no or little knowledge of penetration testing there is enough in this book to introduce you to some concepts and tools used in penetration testing. However this book is seriously lacking for anyone that is more than a novice.
Was this review helpful to you?
Most Recent Customer Reviews
3.0 out of 5 stars A how to manual
I bought this book as an intro to penetration testing. As I apply my life long art and writing skills to web design, I want to be able to test the security of the sites I create. Read more
Published 25 days ago by david froh
5.0 out of 5 stars Wonderful intro to Penetration Testing.
I am a tech savvy individual and this book was great I understood everything and it was a great into to the tools that are essential to Penetration Testing. Read more
Published 6 months ago by Bryan B
5.0 out of 5 stars excellent information
This is a great starting point for a novice interested in learning about penetration testing. The book's methodical approach gives a blueprint on how to start testing.
Published 7 months ago by Greg/Melissa
3.0 out of 5 stars OK book, not a must have, but worthwhile having.
This is an ok book. Not the best, but it is marginally informative. It's a good starting point that will get you thinking more about security.
Published 8 months ago by paf
5.0 out of 5 stars Very good coverage of Basics
The book coverage of basics. I love the way chapters and contents across chapters correlate.

I would definitely recommend this book for all security or hacking... Read more
Published 10 months ago by Yazad K
2.0 out of 5 stars Basics of Hacking
Poorly educated writer with a superficial knowledge of the area. Does not discuss basic principles. Obviously intended for sale to wannabe black hats.
Published 10 months ago by Zeke Smith
4.0 out of 5 stars Decent Intro
This book is a decent introduction to the topic of computer penetration. Emphasis on introduction. This should be clear to the reader already because of the title. Read more
Published 10 months ago by Keith Garrett Brandenburg
4.0 out of 5 stars Good Book
I have not completed the book, but so far a lot of good information for a beginner.
I have about 50% more to read.
Published 10 months ago by mark johnson
4.0 out of 5 stars Very good one
Liked this book. Simple and direct language. Very well organized. If you are a begginer, will like how the author builds the knowdledge foundation. Read more
Published 11 months ago by Amazon Customer
4.0 out of 5 stars start at the 101 level
this book is great for the person who wants to get started in Pen testing. i made good use of the suggestions.
i think others will as well.
Published 11 months ago by inetbogey
Search Customer Reviews
Search these reviews only


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category