Ethical Hacking for All

Ethical Hacking for All

Joe Grant

15,28 €
IVA incluido
Disponible
Editorial:
Indy Pub
Año de edición:
2024
ISBN:
9798869298034
15,28 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

When you think of hacking, what might come to your mind are complex codes and scripts that only geniuses can understand. Again, the notion created by the media is that malicious people only do hacking for their personal gains. However, hacking doesn’t have to be complex, and it does not have to be done for malicious reasons. Ethical hacking, used interchangeably with pen-testing, is the type of hacking where you have permission to hack into a system to expose vulnerabilities and suggest ways to seal these vulnerabilities to make your client’s system more secure. This book explains all you need to know to conduct an ethical hack, either internally or externally. In this book, you will find:·      Introduction to Hacking - Understand the basic terms used in hacking and the different categories of hacking. ·      Linux Basis - Because Linux is the best OS for hackers, we have discussed some of the basic features and tools you will need to be a successful ethical hacker. The Linux BackTrack distro, which was developed for hackers, is discussed in depth.·      Information gathering techniques - This is the first step in ethical gathering. You will learn how to collect information directly from your targets (active information gathering) and indirectly (passive information gathering) and the tools you use to do that.·      Enumerating Targets and Scanning Ports - This is an advanced stage in information gathering where you find out more details about the host, open ports, OS, and running services, among other details. ·      Assessing Target’s Vulnerability - Here, you will learn about different vulnerability scanners and how to use them to find a gateway into the target’s system. ·      Sniffing the Target’s Network - This chapter teaches how to find more details about the target’s network and how to place yourself in the middle of the target’s network to gather more information. ·      Server Side Exploitation - Exploitation stage is where you now gain access to the target’s system. In server-side exploitation, you exploit the hosts and services on the target’s system.·      Client-Side Exploitation - Here, you will learn how to compromise users on a network, including how to crack passwords based on information gathered during information gathering stage.·      Post-Exploitation/Exploiting the Target Further - In this chapter, you will learn how to maintain access on the target’s computer, accessing more details, compromising more targets on the same network as your first target, and escalating privileges.You only need basic computer skills and knowledge on how to use the command prompt in order to use this book. Most of the tools are launched and used through the command line on BackTrack. Don’t be intimidated! It’s a fun journey and we’ll walk you through every step.

Artículos relacionados

  • Poetry Is Our Ministry to Touch the Heart
    Anelda Lukesia Ballard / Jean Anelda Scott
    Poetry is Our Ministry to Touch the Heart, was birthed when Anelda L. Ballard became ill. God spoke to her in a dream and said 'pick up a pen and write' by being obedient this book was written through the Holy Spirit. Anelda and her mother Jean A. Scott believes that God’s wants to heal a hurting heart. This book will inspire you and encourage you to never give up hope. Jesu...
    Disponible

    11,12 €

  • I soldati lunghi
    Pierluigi Romeo di Colloredo Mels
    Il 24 maggio 1915 il Regno d’Italia entrò nella Grande Guerra, che si sarebbe dimostrata il momento più alto e tragico della sua storia, a poco più di cinquant’anni dalla sua unificazione.In quella lotta tremenda durata quattro anni, la Brigata Granatieri di Sardegna , con i suoi due valorosi Reggimenti, i più antichi del Regio Esercito scrisse, nel grande quadro della guerra d...
    Disponible

    32,59 €

  • Five Beneath Philly
    Susan Bandy / Tom Richmond
    Allen Williams plans to make something of his life and escape South Philly and the work at Cross Brothers’ Meat Packing Plant. He prepares himself with excellent grades and an upcoming full-ride scholarship to climb out of South Philly forever. Then fate changes his whole world. An only son in a family of six, Allen suddenly finds himself responsible for his mother, grandmother...
    Disponible

    18,28 €

  • Forms
    Sharon Welch
    I am an award-winning artist and my works hang in private residences, community hospitals, businesses, and restaurants across the US and also abroad.  I live in Pierre, South Dakota. Since 2008 I have owned Sharon Welch Gallery and Studio where I paint and teach classes.  My theory is have fun, remove the fear of failure, experiment and let the child inside of you play.Very oft...
  • Ricordi di una ausiliaria
    Andrea Lombardi / Raffaella Duelli
    Le memorie di Raffaella Duelli, Volontaria nel Battaglione Barbarigo della Decima Flottiglia Mas iniziano con la partenza del Barbarigo da Roma, narrando la lunga marcia del reparto verso il nord, sotto il mitragliamento degli aerei Alleati. Quindi, è descritta vividamente l'ultima battaglia del Barbarigo sul Fronte Sud, dal Senio a Comacchio: gli appunti di Raffaella, giov...
    Disponible

    28,08 €

  • Why Didn’t You Ask?
    Panya Dixon
    From an early occurrence in her childhood to a perilous thirteen-year relationship, Panya Dixon too often suffered from various forms of physical, emotional, and sexual abuse. Conflicted between love and the pain her loved ones brought on her, she consistently had to fight for her life and her will to move on. Why Didn’t You Ask? is an expression of Panya’s truth—her trials, pa...
    Disponible

    20,35 €

Otros libros del autor

  • Hackeo Ético
    Joe Grant
    ¿Sabes si te han hackeado? ¿Sabe si alguna información personal fue robada de su sistema o cuenta? ¿Siempre has querido aprender a proteger tu sistema de este tipo de ataques? Si respondiste que sí a todas estas preguntas, has venido al lugar correcto.A diferencia de la piratería maliciosa, la piratería ética es una forma legal de probar las vulnerabilidades de un sistema. Much...
    Disponible

    20,83 €

  • Aprendizaje automático profundo
    Joe Grant
    ¿Está interesado en el Aprendizaje Automatico? ¿Te fascina cómo funcionan los robots? ¿Estás listo para abrirte a la dinámica del cambio tecnológico?El aprendizaje automático se ha abordado    de manera definitiva como un subconjunto que cae bajo  un conjunto más grande de inteligencia artificial. Se centra principalmente en el aspecto del aprendizaje de máquinas basándose en l...
    Disponible

    21,23 €

  • Raspberry Pi
    Joe Grant
    Programming can feel daunting at times, and it is especially intimidating to beginners, but with the invention of the Raspberry Pi, it became much easier to learn and more affordable. The Pi is a tiny credit card-sized computer that led to the appearance of an entirely new community of geeks. With this straightforward, easy to follow guide, aspiring programmers can now learn th...
    Disponible

    23,87 €

  • Deep Machine Learning
    Joe Grant
    Are you interested in Machine Learning? Are you fascinated by how robots work? Are you ready to open up to the dynamics of technological change?Machine Learning has been approached in a definitive manner as a subset falling under a larger set of Artificial intelligence. It majorly focuses on the aspect of learning of machines basing on the experience and predicting consequences...
    Disponible

    23,98 €

  • Ethical Hacking
    Joe Grant
    Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you’ve come to the right place.Unlike malicious hacking, ethical hacking is a legal way to test the vulnerabilities of a system. Many organizatio...
    Disponible

    23,52 €