Hacking for Dummies
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.
- Mixed media product | 378 pages
- 189 x 236.2 x 23.6mm | 544.32g
- 30 Apr 2004
- John Wiley & Sons Inc
- Hungry Minds Inc,U.S.
- Foster City, United States
"...a good read...a price well--worth paying, because such works are invaluable..." (InfoSecurity News Magazine, August 2004) "...an excellent aide..." (PC Home, August 2004) "...should be of interest to both ethical and malicious hackers..." (Publishing News, 22 nd March 2004)
About K Beaver
Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
Table of contents
Foreword. Introduction. Part I: Building the Foundation for Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Cracking the Hacker Mindset. Chapter 3: Developing Your Ethical Hacking Plan. Chapter 4: Hacking Methodology. Part II: Putting Ethical Hacking in Motion. Chapter 5: Social Engineering. Chapter 6: Physical Security. Chapter 7: Passwords. Part III: Network Hacking. Chapter 8: War Dialing. Chapter 9: Network Infrastructure. Chapter 10: Wireless LANs. Part IV: Operating System Hacking. Chapter 11: Windows. Chapter 12: Linux. Chapter 13: Novell NetWare. Part V: Application Hacking. Chapter 14: Malware. Chapter 15: Messaging Systems. Chapter 16: Web Applications. Part VI: Ethical Hacking Aftermath. Chapter 17: Reporting Your Results. Chapter 18: Plugging Security Holes. Chapter 19: Managing Security Changes. Part VII: The Part of Tens. Chapter 20: Ten Tips for Getting Upper Management Buy--In. Chapter 21: Ten Deadly Mistakes. Part VIII: Appendixes. Appendix A: Tools and Resources. Appendix B: About the Book Web Site. Index.