- Series: Basics
- Paperback: 225 pages
- Publisher: Syngress; 2 edition (August 15, 2013)
- Language: English
- ISBN-10: 9780124116443
- ISBN-13: 978-0124116443
- ASIN: 0124116442
- Product Dimensions: 7.5 x 0.5 x 9.2 inches
- Shipping Weight: 1.1 pounds (View shipping rates and policies)
- Average Customer Review: 200 customer reviews
- Amazon Best Sellers Rank: #73,789 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
"...this is meant to be a practical book, and it positively encourages you to download, fire up and use the tools mentioned. The first chapter even tells you how to set up your own ‘hacking lab’. So whatever your interest in hacking, you’ll get the most out of the book if you follow along."--Network Security,Aug 1 2013
"For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need." - Network Security, December 2011
From the Back Cover
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step methodology for conducting a penetration test or hack. You will be provided with the know-how required to jump start your career or gain a better understanding of offensive security. The book walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases function and relate.
- The second edition includes updated information covering Kali Linux as well as focusing on the seminal tools required to complete a penetration test
- New tools added including the Social Engineer Toolkit, Meterpreter, w3af and more!
- Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
- Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
Try the Kindle edition and experience these great reading features:
Read reviews that mention
Showing 1-5 of 200 reviews
There was a problem filtering reviews right now. Please try again later.
It's a very enjoyable read. The writing is entertaining and educational. I believe from beginning to end I spent about 6 to 8 hours reading it. If you follow along with the examples in the book and try things yourself, you can spend a considerable amount of time in this book. After I read it cover to cover I went back through to try the examples.
There are many suggestions at the end of each chapter on how you can continue learning or practicing more of the concepts presented. These suggestions often go far beyond the basics (so they seemed) and help sharpen certain skills. I have not researched or attempted any of these additional suggestions but many of them sounded very interesting and worth taking a look at.
As mentioned in the title, this is a basics course. You learn the very basics of many tools that can set you on a solid path to a penetration testing career. If you are new to this field and looking to get a solid foundation on hacking and penetration testing then I would highly recommend this book. If you already have a solid foundation of hacking because you were self taught or are in the industry then most of this book will be irrelevant and elementary, but could be a good review. He does a great job at taking a beginning to end approach pointing out areas that some often overlook that could help you be more successful.
I don't know if Patrick Engebretson has written other books but based solely on my experience with this one I will certainly be looking for more from him.
So with that bit of background the aspect of the reconnaissance phase of the pen-testing was mostly repetitive for me but there were a few keys that I took stock in. From the perspective of a complete newbie to the scene this level of detail would most definitely be of benefit for them.
When moving forward deeper into the book on to the scanning and exploitation phases the same level of detail found in phase one (reconnaissance) is still very much prevalent and I found it interesting in the sense of strategy being implemented as I myself have never really thought about the whole "why" aspect of the process, but rather just did it. Having that better grasp on the "why" I've found has made some of my recent actions in this field to be more instinctual now rather than involving a sense of thought.
In the end section of the book covering the reporting of your work and findings to clients I again found this section to be a little on the repetitive side since I've done a lot of reporting that requires the conveying of knowledge to both board members as well as the technical folks. But again the delivery of detail to present the reader with the sense of understanding the why this needs to be accomplished was not lacking.
Overall I'm very impressed with the layout and flow that the book provides taking the reader down a pseudo pen testing experience. But as the title does elude to "The Basics of Hacking..." with the key word being BASICS provides a fundamental overview and not an in-depth scope covering tools used. It talks about the more common tools utilized such as Metasploit for example and cover simple hacks to demonstrate the capabilities of the tools used and that's it. The author does a great job of explaining what you can do next for additional information or how best to practice your newly found skills and does a great job in setting the reader up for success in this regard. If you are an experienced hacker/pen-testing or someone looking to learn/leverage full power of a certain tool then you will be severely disappointed and I suggest looking into the technical "cookbooks" to gain that degree of knowledge. So unless you are completely new or like me looking to gain additional ways of looking at things I feel you won't enjoy or benefit much from this book.
If you think you can get more information from the internet, you're probably right, but where to begin gets overwhelming. To the reviewer who mentions there is more on the internet, obviously believes the internet never lies. The book is structured well and for the price, you shouldn't complain.
Gave the book 4 stars because I felt it was a little dated and wishing the author would begin on the 3rd addition!