Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 178 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
178
Dung lượng
6,17 MB
Nội dung
[...]... and reviewing schematics ofthe building They visit the bank to determine the position ofthe security cameras, make note ofthe guards, and determine when the bank has the most money or is the most vulnerable Clearly, the second criminal has the better chance of getting away with the money It should be obvious that the difference between these two examples is preparation and homework Hackingand penetration. .. exists Penetration tests go a step 2 The BasicsofHackingandPenetrationTesting beyond vulnerability assessments by simulating hacker activity and delivering live payloads In this book, we will cover the process of vulnerability assessment as one ofthe steps utilized to complete a penetration test Setting the Stage Understanding all the various players and positions in the world ofhackingand penetration. .. technical and nontechnical personnel It is important not to fill the executive summary with too many technical details; that is the purpose ofthe detailed report CHAPTER REVIEW This chapter introduced the concept of penetrationtestingandhacking as a means of securing systems It also discussed the various roles and characters that take part in thehacking scene The chapter examined the basicsof Backtrack... Regardless ofthe amount of time and planning you put into conducting thepenetration test, the client will often judge your work and effectiveness on the basis ofthe quality of your report The final PT report should include all the relevant information uncovered in your test and explain in detail how the test was conducted and what was done during the test Whenever possible, mitigations and solutions... use the term “Information Gathering,” whereas others call the same process “Reconnaissance.” For the purpose of this book, we will focus on the activities ofthe phase rather than the name After you have mastered the basics, you can review the various penetrationtesting methodologies and choose one that you like best To keep things simple, we will use a four-step process to explore and learn penetration. .. several other options, but these are outside the scope of this book To select the desired boot option, simply use the arrow keys to highlight the appropriate row and hit the enter key to confirm your selection Figure 1.1 shows an example ofthe Backtrack boot screen The use of Backtrack is not required to work through this book or to learn the basicsofhacking Any version of Linux will do fine The major... Acknowledgments Mary and Joseph, princesses, Barbie’s, andthe Pirate Ship! Daddy loves you more than life itself My Family Thanks to my mother and father for the gift of education and teaching me to understand the value of hard work and dedication to a project Thanks also to my other mother, who dedicated countless hours to reading and correcting my initial rough drafts To the Syngress Team Thanks for the opportunity!... for thepenetration tester It is important that both sides fully understand the authorization and scope ofthe PT White hats must always respect the authorization and remain within the scope ofthe test Black hats will have no such constraints on the target list The second way to differentiate between an ethical hacker and a malicious hacker is through examination ofthe attacker’s motivation If the. .. organization safe and secure, penetrationtesting needs to be included in your overall security plan as well Penetrationtesting allows you 3 4 The BasicsofHackingandPenetrationTesting to view your organization through the eyes ofthe enemy This process can lead to many surprising discoveries and give you the time needed to patch your systems before a real attacker can strike One ofthe great things about... how these tools fit together Other books focus on hacking a particular subject but lack the broad picture This book is intended to address these issues It is meant to be a single starting point for anyone interested in the topics ofhacking or penetrationtestingThe book will certainly cover specific tools and topics but will also examine how the tools fit together and how they rely on one another . >
This page intentionally left blank
The Basics of Hacking
and Penetration Testing
Ethical Hacking and Penetration
Testing Made Easy
Patrick Engebretson
Technical.