000 08124cam a2200865 i 4500
001 on1195822867
003 OCoLC
005 20240523125543.0
006 m d
007 cr |n|||||||||
008 200919s2020 inu o 001 0 eng d
040 _aEBLCP
_beng
_cEBLCP
_dK6U
_dOCLCO
_dOCLCF
_dOCLCO
_dOCLCQ
_dLDS
_dYDX
_dDG1
_dUKMGB
_dN$T
_dRECBK
_dTEFOD
_dUKAHL
_dTOH
_dMUB
_dNBJ
_dIEEEE
_dUX0
_dOCLCO
_dOCLCL
015 _aGBC037034
_2bnb
016 7 _a019738701
_2Uk
019 _a1184234625
_a1197737980
_a1197768941
_a1239767749
020 _a9781119561484
_q(electronic book)
020 _a1119561485
_q(electronic book)
020 _z9781119561453
_q(paperback)
020 _a9781119561507
_q(electronic bk. ;
_qoBook)
020 _a1119561507
_q(electronic bk. ;
_qoBook)
020 _a1119561515
020 _a9781119561514
_q(electronic bk.)
020 _z1119561450
024 7 _a10.1002/9781119561507
_2doi
029 1 _aAU@
_b000068069113
029 1 _aAU@
_b000068846281
029 1 _aUKMGB
_b019738701
029 1 _aAU@
_b000074273119
035 _a(OCoLC)1195822867
_z(OCoLC)1184234625
_z(OCoLC)1197737980
_z(OCoLC)1197768941
_z(OCoLC)1239767749
037 _a9781119561514
_bWiley
037 _a9F0CF8BB-F813-46DE-8E8F-B4DCB3A901AA
_bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a9820824
_bIEEE
050 4 _aQA76.9.A25
_bH53 2020eb
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aHickey, Matthew
_c(Computer security expert),
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PCjK4hVwgwrgGwKjPFtbx8P
245 1 0 _aHands on hacking /
_cMatthew Hickey with Jennifer Arcuri.
246 3 4 _aHands on hacking :
_bbecome an expert at next gen penetration testing and purple teaming
264 1 _aIndianapolis, Indiana :
_bWiley,
_c2020.
300 _a1 online resource (xxvii, 580 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aDescription based upon print version of record.
505 0 _aAbout the Authors -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Chapter 1 Hacking a Business Case -- All Computers Are Broken -- The Stakes -- What's Stolen and Why It's Valuable -- The Internet of Vulnerable Things -- Blue, Red, and Purple Teams -- Blue Teams -- Red Teams -- Purple Teams -- Hacking is Part of Your Company's Immune System -- Summary -- Notes -- Chapter 2 Hacking Ethically and Legally -- Laws That Affect Your Work -- Criminal Hacking -- Hacking Neighborly -- Legally Gray -- Penetration Testing Methodologies -- Authorization -- Responsible Disclosure -- Bug Bounty Programs -- Legal Advice and Support -- Hacker House Code of Conduct -- Summary -- Chapter 3 Building Your Hack Box -- Hardware for Hacking -- Linux or BSD? -- Host Operating Systems -- Gentoo Linux -- Arch Linux -- Debian -- Ubuntu -- Kali Linux -- Verifying Downloads -- Disk Encryption -- Essential Software -- Firewall -- Password Manager -- Email -- Setting Up VirtualBox -- Virtualization Settings -- Downloading and Installing VirtualBox -- Host-Only Networking -- Creating a Kali Linux VM -- Creating a Virtual Hard Disk -- Inserting a Virtual CD -- Virtual Network Adapters -- Labs -- Guest Additions -- Testing Your Virtual Environment -- Creating Vulnerable Servers -- Summary -- Chapter 4 Open Source Intelligence Gathering -- Does Your Client Need an OSINT Review? -- What Are You Looking For? -- Where Do You Find It? -- OSINT Tools -- Grabbing Email Addresses from Google -- Google Dorking the Shadows -- A Brief Introduction to Passwd and Shadow Files -- The Google Hacking Database -- Have You Been "Pwned" Yet? -- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).
500 _aProbing the SMTP Service
520 _aHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors. We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aPenetration testing (Computer security)
650 0 _aComputer networks
_xSecurity measures.
650 0 _aHacking.
650 0 _aHacking
_xMoral and ethical aspects.
650 0 _aComputer security.
650 2 _aComputer Security
650 6 _aTests d'intrusion.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 6 _aPiratage informatique.
650 6 _aPiratage informatique
_xAspect moral.
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xSecurity
_xNetwork Security.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
650 7 _aHacking
_2fast
650 7 _aPenetration testing (Computer security)
_2fast
700 1 _aArcuri, Jennifer,
_eauthor.
776 0 8 _iPrint version:
_aHickey, Matthew
_tHands on Hacking
_dNewark : John Wiley & Sons, Incorporated,c2020
_z9781119561453
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507
938 _aProQuest Ebook Central
_bEBLB
_nEBL6301556
938 _aAskews and Holts Library Services
_bASKH
_nAH35944695
938 _aEBSCOhost
_bEBSC
_n2571348
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00835940
938 _aYBP Library Services
_bYANK
_n16892073
938 _aYBP Library Services
_bYANK
_n16295891
994 _a92
_bINLUM
999 _c12738
_d12738