Dewey Edition23
Reviews" Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer "Good for beginners in cybersecurity, ethical hacking and offensive security. . . . 4.5 / 5.0" --Uday Mittal, Cybersecurity Professional, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer
SynopsisEthical Hacking is a crash course in modern hacking techniques. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin by capturing a victim's network traffic with an ARP spoofing attack and then view the packet capture in Wireshark. Next, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and craft fake emails like the ones used in phishing attacks. You'll also learn how to fuzz software for new vulnerabilities, create trojans and rootkits, exploit websites with SOL injection, and escalate your privileges in order to extract credentials to traverse a private network. Along the way, you'll work with a wide range of professional pentesting tools (such as the Metasploit Framework, mimikatz, and BeEF), discover how advanced fuzzers work behind the scenes, see how internet traffic gets encrypted, and explore the inner mechanisms of nation-state malware like Drovorub. You'll also learn how to: Execute cross-site scripting attack to deliver sophisticated JavaScript payloads, Write your own hacking tools in Python, Capture passwords in a corporate Windows network, Scan countless devices on the internet to find potential victims, Install Linux rootkits that modify a victim's operating system, Ethical Hacking addresses modern cybersecurity issues and teaches you the fundamental skills you need to become an ethical hacker. Take the first step in your pentesting career by learning how the experts break in. Book jacket., A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools--and learn to write your own tools in Python--as you practice tasks like: Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim's operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker someone who can carefully analyze systems and creatively gain access to them., This introduction to hacking covers everything you need to know to start your own journey to becoming an ethical hacker. With help from a lab setup that lets you hack along to each chapter, this book walks you through a variety of the most useful activities for any hacker. You'll begin by capturing and viewing a victim's traffic, then learn how to encrypt files and fake emails, and craft sophisticated social engineering attacks. In the later chapters, you'll learn how to fuzz, write trojans and rootkits, and perform website exploitation. Along the way, you'll develop a fundamental understanding of technologies like network protocols, websites, and the Linux operating system. You'll also work with tools used by professional penetration testers, such as Metasploit and Wireshark, and go from setting up a virtual lab environment for small scale hacks that could take place in a coffee shop to expanding this skill in order to take over an extensive corporate network. This manual is a must for any programmer interested in learning the fundamentals of designing their own hacking tools. It takes a deep dive into many topics, but uses beginner-friendly explanations for those just starting out. Exercises at the end of each chapter help expand on what's learned.
LC Classification NumberTK5105.59