Start reading The Basics of Hacking and Penetration Testing: Ethical Ha... on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device

 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books even without a Kindle device-with the FREE Kindle app for smartphones and tablets.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
 
 

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) [Kindle Edition]

Patrick Engebretson
4.7 out of 5 stars  See all reviews (18 customer reviews)

Kindle Price: 11.74 includes VAT* & free wireless delivery via Amazon Whispernet
* Unlike print books, digital books are subject to VAT.

Formats

Amazon Price New from Used from
Kindle Edition 11.74  
Paperback --  
Amazon.co.uk Trade-In Store
Did you know you can use your mobile to trade in your unwanted books for an Amazon.co.uk Gift Card to spend on the things you want? Visit the Books Trade-In Store for more details or check out the Trade-In Amazon Mobile App Guidelines on how to trade in using a smartphone. Learn more.


Product Description

Review

"Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards

"Have you heard of penetration testing but have no idea what it entails? This is the perfect book to get you started, easy to read, does not assume prior knowledge, and is up-to-date. I strongly recommend Pat's latest work."--Jared DeMott, Principle Security Researcher, Crucial Security, Inc.

"If you are searching for a book to get you started with penetration testing, 'The Basics of Hacking and Penetration Testing' is the right one. It assumes little and gives a lot, and doesn't require huge amounts of technical knowledge in order to be read or understood. As complex the subject may sound to novices, the author does a great job explaining it. He eschews techno-babble and when he repeatedly returns to some issues, it's because he has more to say about them, not because he can't think about what to right next."--Help Net Security

"This book offers a broad overview of basic concepts of hacking and penetration testing for readers with no previous background. It outlines a four-phase model of conducting a penetration test, or an 'ethical hack,' and shows how to use such hacking tools as Backtrack Linux, Hacker Defender, and MetGooFil. A sequential example throughout the book demonstrates how the tools and phases work together. The book includes chapter introductions and summaries, b&w screenshots, examples and exercises, and recommended resources."--SciTech Book News

"If you are an information security beginner with some experience in computer technology, especially networking, I would recommend this book. If you are an intermediate level pen tester or an advanced tester, you might not find this book as useful. That being said, it never hurts to browse through the book and see if any new tools or technology are mentioned here that warrant a closer look. As mentioned earlier, penetration testing is an ever growing field and it is quite possible that as an expert, you might have missed something new. This book introduces you to just enough tools and technology to get your feet wet. If this kind of testing gives you a thrill, then you might want to look into more advanced topics and resources. If this is the only resource you used to escalate your interest in pen testing, then you have no one else but the author to thank for it."--PenTest Extra Magazine Vol. 2, No. 3, June

Product Description

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.



  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Product details


More About the Author

Discover books, learn about writers, and more.


Customer Reviews

3 star
0
2 star
0
1 star
0
4.7 out of 5 stars
4.7 out of 5 stars
Most Helpful Customer Reviews
4 of 4 people found the following review helpful
5.0 out of 5 stars Great Book! 6 Feb 2012
By frede
Format:Paperback|Verified Purchase
The book arrived on time and perfect conditions, the author is very clear when explaining things and gives a clearly idea of the big picture of penetration testing, great book for beginners
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
5.0 out of 5 stars uni needs for ethical hacking 19 Oct 2012
Format:Paperback|Verified Purchase
This is an essential read if you want to know the basics of ethical hacking. It guides you from the very start and makes It very easy to read. I have bought this book to help me get through 3rd year in university and so far so good.
Comment | 
Was this review helpful to you?
9 of 10 people found the following review helpful
By C.Mans
Format:Paperback
This book is a perfect book to get you started in the world of (Ethical)hacking and Pentesting.
It covers the following four step:

-Reconnisance
-Scanning
-Exploitation
-Maintaining access

Each chapter is explained to a good extend providing tools and examples to get started.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars Very good starters guide. 18 Mar 2013
Format:Paperback|Verified Purchase
This book is absolutely fantastic for beginners. The first parts you read the author gives you a little introduction as to what hacking is and the ethics of hacking and sums up 'White Hats' and 'Black Hats' quite nicely. Surprisingly this book isn't too technical and is VERY easy to follow and understand.

There is a lot of times during the book that the author says 'But this is out of the scope of the book'. Don't knock that though, this is a beginners guide after all. Will you be an expert after reading this book? Hell no! But will you know some of the basics? YES! I personally think that this book will give you a 'feel' for pentesting, making you decide whether you would like to take it further. It is highly advised that you research some of the stuff that is mentioned in this book. Plus, practising how to research efficiently will help you out in your career as a Ethical Hacker.

After reading this book I have now gone on to read more advanced books, and will be studying for the OSCP cert this summer. This book is a must have for anybody wanting to know the basics of hacking.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Good for introdution to the subject 3 Mar 2013
Format:Paperback|Verified Purchase
The content is like a 101 course for the subject.. consider it as light reading and then go to something deeper on the subject of PenTest
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
5.0 out of 5 stars Great book! 31 Jan 2013
By B
Format:Paperback
Really good book that tells you all you need to know to get started in hacking and penetration testing. It is a really great subject and really interesting to learn about how it all works and links in together. Its a good book to help you see the bigger picture.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars good book 12 Oct 2012
Format:Paperback|Verified Purchase
good beginners book, covers all the basics. it is slightly out of date after the release of backtrack 5, but is informative and a good starting point.
Comment | 
Was this review helpful to you?
Format:Paperback|Verified Purchase
Great fun introduction to a very serious subject. Readers should be aware that this is very much a "toe in the water" taster, if you will excuse the mixed metaphors. I think that a good deal of previous and further reading should be undertaken before diving in too deeply.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
4.0 out of 5 stars Recommendation
Well I have to say that I am a pharmacist, I am not familiar with programming but I am very interested to learn. Read more
Published 5 months ago by Kim
5.0 out of 5 stars a nice book
a good book wit good explanations. Easy to red.
It's good for self study. A good basic knowledge of tcp is nessesary to understand it real.
Published 7 months ago by Asia Fan
4.0 out of 5 stars Good basic framework
I've been playing around with the tools described in this book for years, but now that I'm getting serious about going further in security, Patrick's book has given me a good... Read more
Published 7 months ago by B. Calder
4.0 out of 5 stars Sickening enthusiasm
Well written.
Over lavished with insincere 'morals' to wash down with the lessons. Rather too much encouragement and information, truly frightening tool-sets introduced and... Read more
Published 8 months ago by Mr. Simon O'riordan
5.0 out of 5 stars Brilliant read
If you are looking to explore the world of ethical hacking then this should be the first book you read, I found it good at helping me get to grips with each stage of the tutorial... Read more
Published 9 months ago by MR A M THOMAS
4.0 out of 5 stars Very good for the beginner
First off, this is a very good quality and well written book, especially for a beginner. It does a excellent job at hammering home the importance of recon and a logical... Read more
Published 11 months ago by Oliver Darroch
5.0 out of 5 stars Good Book
I've always been good with computer, enjoyed tinkering with them. Roughly two years ago I became a first line support technician, but was becoming more and more curious with... Read more
Published 11 months ago by D. Verrall
5.0 out of 5 stars Great book
The name say it all. Most of the things are something you already know, however you can always learn something
Published 14 months ago by dmarcos
5.0 out of 5 stars Start here!
I've really only just entered the world of security, and for me this was the perfect entry.

This gives a great introduction to some of the methods used by hackers/pen... Read more
Published 15 months ago by Anon
Search Customer Reviews
Only search this product's reviews

Popular Highlights

 (What's this?)
&quote;
A vulnerability assessment is the process of reviewing services and systems for potential security issues, whereas a penetration test actually performs exploitation and POC attacks to prove that a security issue exists. &quote;
Highlighted by 58 Kindle users
&quote;
At its core, these differences can be boiled down to three key points: authorization, motivation, and intent. &quote;
Highlighted by 46 Kindle users
&quote;
HTTrack is a free utility that creates an identical, off-line copy of the target website. &quote;
Highlighted by 45 Kindle users

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   



Look for similar items by category


ARRAY(0xb5071bd0)