Programming Books C Java PHP Python Learn more Browse Programming Books
Sell yours for a Gift Card
We'll buy it for $4.62
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) Paperback – August 4, 2011

ISBN-13: 978-1597496551 ISBN-10: 1597496553 Edition: 1st

11 New from $44.94 22 Used from $19.98
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$7.83
Paperback
"Please retry"
$44.94 $19.98
NO_CONTENT_IN_FEATURE
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Syngress Basics Series
  • Paperback: 180 pages
  • Publisher: Syngress; 1 edition (August 4, 2011)
  • Language: English
  • ISBN-10: 1597496553
  • ISBN-13: 978-1597496551
  • Product Dimensions: 7.5 x 0.4 x 9.2 inches
  • Shipping Weight: 1 pounds
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (75 customer reviews)
  • Amazon Best Sellers Rank: #650,180 in Books (See Top 100 in Books)

Editorial Reviews

Review

"...an introduction to what ethical hacking involves, and a primer for more indepth technical volumes...it does get its hands dirty with guides to using the main tools. But each technique or piece of software is only covered to the depth required to give you a good feel for what's going on..."--Network Security, December 1 2011

From the Back Cover

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.

    • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
    • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
    • Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

More About the Author

Father. Husband. Professor. Hacker. Pen Tester. And now author!

Born in northern Minnesota, undergraduate at North Dakota State University, Masters and Doctorate at Dakota State University.

Customer Reviews

Very easy to read, very fun and interesting!
Jose
Finally, chapter 7, gives the a reader a basic overview in how to conduct the writing of the final penetration test report, useful for the professional pen tester.
psimoes
I highly recommend this book to anyone who is interested in pen testing and/or ethical hacking.
J. Jangula

Most Helpful Customer Reviews

51 of 55 people found the following review helpful By jlh on August 15, 2011
Format: Paperback Verified Purchase
This is a really great book that delivers on the promise described in the title. It covers the basics of hacking and penetration test and makes no assumption of prior security or hacking knowledge. This is an excellent resource for anyone looking to jumpstart his or her knowledge in this area.

The book takes the reader on a quick step-by-step journey through a penetration test beginning with Information Gathering, moving into Scanning, then Exploitation, and concluding with Report Writing. While the book does not cover any particular methodology like OSSTM or PTES it does a nice job of laying out each step in an orderly and straightforward manner. The book covers all of the major tools, in an appropriate order so the reader gets a good sense of how to run the tools and how they relate to each other.

The book gets down to business in chapter 1 and wastes no time in bringing the reader up to speed on the latest tools and techniques. One of the greatest strengths of the book is its size. Most people will be able to read through the entire book in just a few days. Another benefit of covering only the basics is that the book should have a longer shelf life. As the author points out, a Nmap Syn scan has been the same for the past 10 years.

If you're looking for an in-depth coverage of any particular tool like Nmap, Metasploit, or the like, this is not the book for you. You're better off buying a book dedicated to the tool you're interested in.

On the flip side, if you're interested in seeing the whole picture and getting a feel for how to run and use the major tools used in a basic penetration test this is a good buy.

Finally, I enjoyed the laidback and casual writing style of the author. This made the chapters easier to digest and kept me interested while still delivering enough technical meat to satisfy my knowledge and process requirements.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
22 of 24 people found the following review helpful By Jose on October 10, 2011
Format: Paperback Verified Purchase
Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers (or provide additional value to my Projects), network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about PEN testing tools or techniques, this book delivers what is promised on the cover and much more!

All chapters are very coherent, meticously structured and nicely integrated between each other thanks to the PEN test process it follows. There are even suggestions about how to test all the examples in a secure and practical way. Of course, a virtual lab using any of the virtualization technologies is highly advised. The author suggests VMware, I used Parallels, but there are several free tools out there including Virtual PC or VirtualBox, both are free as well.

The book uses Metasploit framework/software for its examples but makes strong emphasize on concepts rather than tools, which it is very good in my opinion because whatever is being taught can be later extrapolated using other tools. PEN test is more a process than mere scripts and tools. I also like the fact that you don't need a very strong knowledge on networking, cryptography or C++ in order to understand this book.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
19 of 23 people found the following review helpful By Frederick Schmidt on August 19, 2011
Format: Paperback Verified Purchase
I work for a small company with little resources for security when it comes to protection against people with malicious intent. We run our own web and data servers and have been hacked on at least on occasion. This book really helped me learn how to test my network for weaknesses. Gave me best practice tips for protecting our servers against unwanted penetration. Most of all it showed me how little I new about how easy it was to penetrate our network even with off the shelf applications. This book is a must for small businesses trying to run big business operations.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
28 of 36 people found the following review helpful By GK on March 23, 2012
Format: Paperback Verified Purchase
Pros:
Some good introductions to ideas and tools of penetration testing.

Cons:
Not coherent or consistent at times.

This book starts and finishes well, but the middle is insufficient in information and lacks consistency. More than once in the penetration/exploit sections I had to check to see if I was missing a page. The biggest problem with coherence in the book has to do with the fact that the author explains that most pen tests will be done from the outside, but then out of nowhere switches from penetration testing to hacking a machine while actually sitting at it! The author would talk about what could be done from the outside, but then go on to how it is done from the inside (physically at the machine) with no explanation for the jump. I more than once had to check to see if I was missing a page, because the jumps were that drastic. Also many of the screen shots are not placed well, to the point where you have to stop reading and find the reference screenshot.

While there is a decent amount of good introductive information for those looking to get into or just learn about penetration testing, this book falls horribly short of what it could and should be. Bottom line, if you have no or little knowledge of penetration testing there is enough in this book to introduce you to some concepts and tools used in penetration testing. However this book is seriously lacking for anyone that is more than a novice.
4 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews