skip to content
Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing. Preview this item
ClosePreview this item
Checking...

Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.

Author: Zaid Sabih
Publisher: Birmingham : Packt Publishing Ltd, 2018.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Sabih, Zaid.
Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
Birmingham : Packt Publishing Ltd, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Zaid Sabih
ISBN: 9781788624787 1788624785
OCLC Number: 1048797823
Notes: Client-side attacks using social engineering.
Description: 1 online resource (549 pages)
Contents: Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What's in this book?; Preparation; Penetration testing; Network penetration testing; Gaining access; Post exploitation; Website penetration testing; Protecting your system; What is hacking?; Why should we learn about hacking?; A glimpse of hacking; Browser exploitation framework; Accessing the target computer's webcam; Summary; Chapter 2: Setting Up a Lab; Lab overview; VirtualBox; Installation of VirtualBox; Installing Kali Linux; Installing Metasploitable. Installing WindowsCreating and using snapshots ; Summary; Chapter 3: Linux Basics; Overview of Kali Linux; Status bar icons; Connecting the wireless card; Linux commands; Commands; The ls command; The man command; The help command; The Tab button; Updating resources; Summary; Chapter 4: Network Penetration Testing; What is a network?; Network basics; Connecting to a wireless adapter; MAC addresses; Wireless modes --
managed and monitor; Enabling monitor mode manually; Enabling monitor mode using airmon-ng; Summary; Chapter 5: Pre-Connection Attacks; Packet sniffing basics. Targeted packet sniffing Deauthentication attack; What is a fake access point?; Creating fake access points with the MANA Toolkit; Summary; Chapter 6: Network Penetration Testing --
Gaining Access; WEP theory; Basic web cracking; Fake authentication attack; ARP request replay; WPA introduction; WPS cracking; Handshake theory; Capturing the handshake; Creating a wordlist; Wordlist cracking; Securing network from attacks; Summary; Chapter 7: Post-Connection Attacks; Post-connection attacks; The netdiscover tool; The AutoScan tool; Zenmap; Summary ; Chapter 8: Man-in-the-Middle Attacks. Man-in-the-middle attacksARP spoofing using arpspoof; ARP spoofing using MITMf; Bypassing HTTPS; Session hijacking; DNS spoofing; MITMf screenshot keylogger; MITMf code injection; MITMf against a real network; Wireshark; Wireshark basics ; Wireshark filters; Summary; Chapter 9: Network Penetration Testing, Detection, and Security; Detecting ARP poisoning; Detecting suspicious behavior; Summary; Chapter 10: Gaining Access to Computer Devices; Introduction to gaining access; Server side; Client side; Post-exploitation; Sever-side attacks; Server-side attack basics. Server-side attacks --
Metasploit basicsMetasploit remote code execution; Summary; Chapter 11: Scanning Vulnerabilities Using Tools; Installing MSFC; MSFC scan; MSFC analysis; Installing Nexpose; Running Nexpose; Nexpose analysis; Summary; Chapter 12: Client-Side Attacks; Client-side attacks; Installing Veil; Payloads overview; Generating a Veil backdoor; Listening for connections; Testing the backdoor; Fake bdm1 updates; Client-side attacks using the bdm2 BDFProxy; Protection against delivery methods; Summary; Chapter 13: Client-Side Attacks --
Social Engineering.

Abstract:

This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1048797823> # Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "1048797823" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/5404715552#Place/birmingham> ; # Birmingham
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#CreativeWork/kali_linux> ; # Kali Linux.
    schema:about <http://dewey.info/class/005.87/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computers_security_general> ; # COMPUTERS / Security / General
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#Topic/penetration_testing_computer_security> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computer_security> ; # Computer security
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/5404715552#Person/sabih_zaid> ; # Zaid Sabih
    schema:datePublished "2018" ;
    schema:description "Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What's in this book?; Preparation; Penetration testing; Network penetration testing; Gaining access; Post exploitation; Website penetration testing; Protecting your system; What is hacking?; Why should we learn about hacking?; A glimpse of hacking; Browser exploitation framework; Accessing the target computer's webcam; Summary; Chapter 2: Setting Up a Lab; Lab overview; VirtualBox; Installation of VirtualBox; Installing Kali Linux; Installing Metasploitable."@en ;
    schema:description "This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5404715552> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/5404715552#CreativeWork/learn_ethical_hacking_from_scratch_your_stepping_stone_to_penetration_testing> ;
    schema:name "Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing."@en ;
    schema:productID "1048797823" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1048797823#PublicationEvent/birmingham_packt_publishing_ltd_2018> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/5404715552#Agent/packt_publishing_ltd> ; # Packt Publishing Ltd
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781788624787> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5485020> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5485020> ;
    schema:workExample <http://worldcat.org/isbn/9781788624787> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1048797823> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5404715552#Agent/packt_publishing_ltd> # Packt Publishing Ltd
    a bgn:Agent ;
    schema:name "Packt Publishing Ltd" ;
    .

<http://experiment.worldcat.org/entity/work/data/5404715552#Person/sabih_zaid> # Zaid Sabih
    a schema:Person ;
    schema:familyName "Sabih" ;
    schema:givenName "Zaid" ;
    schema:name "Zaid Sabih" ;
    .

<http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5404715552#Topic/computers_security_general> # COMPUTERS / Security / General
    a schema:Intangible ;
    schema:name "COMPUTERS / Security / General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5404715552#Topic/penetration_testing_computer_security> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<http://worldcat.org/entity/work/data/5404715552#CreativeWork/learn_ethical_hacking_from_scratch_your_stepping_stone_to_penetration_testing>
    a schema:CreativeWork ;
    rdfs:label "Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1048797823> ; # Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
    .

<http://worldcat.org/isbn/9781788624787>
    a schema:ProductModel ;
    schema:isbn "1788624785" ;
    schema:isbn "9781788624787" ;
    .

<http://www.worldcat.org/title/-/oclc/1048797823>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1048797823> ; # Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
    schema:dateModified "2019-11-20" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.