• Complain

Daniel Graham - Ethical Hacking: A Hands-on Introduction to Breaking In

Here you can read online Daniel Graham - Ethical Hacking: A Hands-on Introduction to Breaking In full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: No Starch Press, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Ethical Hacking: A Hands-on Introduction to Breaking In
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Ethical Hacking: A Hands-on Introduction to Breaking In: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Ethical Hacking: A Hands-on Introduction to Breaking In" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, youll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. Youll begin with the basics: capturing a victims network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, youll deploy reverse shells that let you remotely run commands on a victims computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, youll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which youll use to traverse a private network. Youll work with a wide range of professional penetration testing toolsand learn to write your own tools in Pythonas you practice tasks like: Deploying the Metasploit frameworks reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victims operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, youll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, youll be able to think like an ethical hacker: someone who can carefully analyze systems and creatively gain access to them.

Daniel Graham: author's other books


Who wrote Ethical Hacking: A Hands-on Introduction to Breaking In? Find out the surname, the name of the author of the book and a list of all author's works by series.

Ethical Hacking: A Hands-on Introduction to Breaking In — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Ethical Hacking: A Hands-on Introduction to Breaking In" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
ETHICAL HACKING A Hands-on Introduction to Breaking In by Daniel G Graham - photo 1
ETHICAL HACKING

A Hands-on Introduction to Breaking In

by Daniel G. Graham

San Francisco ETHICAL HACKING Copyright 2021 by Daniel G Graham All rights - photo 2

San Francisco

ETHICAL HACKING. Copyright 2021 by Daniel G. Graham.

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

ISBN-13: 978-1-7185-0187-4 (print)

ISBN-13: 978-1-7185-0188-1 (ebook)

Publisher: William Pollock

Managing Editor: Jill Franklin

Production Manager: Rachel Monaghan

Production Editors: Kassie Andreadis and Katrina Taylor

Developmental Editor: Frances Saux

Cover and Interior Design: Octopod Studios

Cover Illustrator: Garry Booth

Technical Reviewer: Ed Novak

Copyeditor: George Hale

Production Services: Octal Publishing, Inc.

For information on book distributors or translations, please contact No Starch Press, Inc. directly:

No Starch Press, Inc.

245 8th Street, San Francisco, CA 94103

phone: 415.863.9900; fax: 415.863.9950;

Library of Congress Control Number: 2021940441

No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.

This book is dedicated to my loving wife, Shea Graham, who supported me throughout this process. I want the world to know how much I love you. Thanks for reading all the rough drafts. This book would not have been possible without your encouragement and support. May our future children be inspired to share their ideas with the universe and grow into a prosperous generation of Christians.

And to my family: my father, Errol Graham, son of a carpenter and the first in our family to go to college; my mother, Angelique Graham, who loves us unconditionally and always supported us; my sister, Dr. Dominique Vaughn, who is my friend for life; and my brother-in-law Adrian Vaughn, my father-in-law Les Tinsley, and my mother-in-law Fay Tinsley.

Daniel G. Graham, PhD

About the Author

Dr. Daniel G. Graham is an assistant professor of computer science at the University of Virginia in Charlottesville. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a program manager at Microsoft. He publishes in IEEE journals relating to sensors and networks.

About the Technical Reviewer

Dr. Ed Novak is an assistant professor of computer science at Franklin and Marshall College in Lancaster, Pennsylvania. He received a PhD from The College of William and Mary in 2016. His research interests revolve around security and privacy in smart mobile devices.

BRIEF CONTENTS
CONTENTS IN DETAIL

1
SETTING UP

PART I
NETWORK FUNDAMENTALS

2
CAPTURING TRAFFIC WITH ARP SPOOFING

3
ANALYZING CAPTURED TRAFFIC

4
CRAFTING TCP SHELLS AND BOTNETS

PART II
CRYPTOGRAPHY

5
CRYPTOGRAPHY AND RANSOMWARE

6
TLS AND DIFFIE-HELLMAN

PART III
SOCIAL ENGINEERING

7
PHISHING AND DEEPFAKES

8
SCANNING TARGETS

PART IV
EXPLOITATION

9
FUZZING FOR ZERO-DAY VULNERABILITIES

10
BUILDING TROJANS

11
BUILDING AND INSTALLING LINUX ROOTKITS

12
STEALING AND CRACKING PASSWORDS

13
SERIOUS CROSS-SITE SCRIPTING EXPLOITATION

PART V
CONTROLLING THE NETWORK

14
PIVOTING AND PRIVILEGE ESCALATION

15
MOVING THROUGH THE CORPORATE WINDOWS NETWORK

16
NEXT STEPS

ACKNOWLEDGMENTS

I want to thank everyone who helped make this book possible. I especially want to thank my wife, Shea Graham, who proofed the early versions of this book. Thanks for all your love and encouragement.

To the editorial and production teams at No Starch Press, thank you. Frances Saux, your excellent comments and careful edits made the book better. Thank you for all your hard work. George Hale and Bob Russell, thanks for double-checking each chapter. Thanks to production editors Kassie Andreadis and Katrina Taylor and the founder of No Starch Press, Bill Pollock.

To the technical scholars whose comments and conversations helped shape this book: thank you. Ed Novak, PhD, you did a fantastic job editing the technical details of the book. To my friend and colleague Jesse Laeuchli, PhD, thank you for helping design the books virtual lab and suggesting topics and exercises to include. To my colleagues David Wu, PhD, and Charles Reiss, PhD, thanks for the comments, emails, and conversations on cryptography and Linux kernel modules.

To Srikar Chittari and my other undergraduate research assistants, Jacob Pacheco and Jeffery Gerken, who volunteered to test the chapters, and to my students who got an early preview of the book and helped catch various bugs: thank you.

To Jim Cohoon, thanks for introducing me to the world of computer science. To my faculty mentor Tom Horton, PhD, and Kevin Skadron, PhD, chair of the computer science department, thanks for your kind words of encouragement. And to Juan Gilbert, PhD, chair of the Department of Computer and Information Science and Engineering at the University of Florida, thank you for writing the foreword.

Finally, to Professor Malathi Veeraraghavan, PhD, thank you for introducing me to the fantastic field of networking. You will be dearly missed by your former students and the faculty of the University of Virginia.

FOREWORD

We exist in a time where hackers hold more influence than ever before. Hacking can now impact the lives of millions of people by targeting elections, power grids, and all sorts of infrastructure that people rely on for their day-to-day activities, not to mention their well-being.

In 2021, hackers used ransomware to take down the United States largest gasoline pipeline. This fueled anxiety, canceled flights, and caused shortages. The well-executed attack was personal for many people who experienced its impact firsthand.

With this level of influence, it is imperative that we not only teach ethical hacking but also encourage it. Ethical Hacking

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Ethical Hacking: A Hands-on Introduction to Breaking In»

Look at similar books to Ethical Hacking: A Hands-on Introduction to Breaking In. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Ethical Hacking: A Hands-on Introduction to Breaking In»

Discussion, reviews of the book Ethical Hacking: A Hands-on Introduction to Breaking In and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.