Book description
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.
Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.
- Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks
- Develop an effective ethical hacking plan that keeps your system safe
- Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies
- Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure
Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.
Table of contents
-
- Cover
- Foreword
- Introduction
- Part I: Building the Foundation for Security Testing
- Part II: Putting Security Testing in Motion
- Part III: Hacking Network Hosts
-
Part IV: Hacking Operating Systems
- Chapter 12: Windows
-
Chapter 13: Linux
- Understanding Linux Vulnerabilities
- Choosing Tools
- Gathering Information About Your Linux Vulnerabilities
- Finding Unneeded and Unsecured Services
- Securing the .rhosts and hosts.equiv Files
- Assessing the Security of NFS
- Checking File Permissions
- Finding Buffer Overflow Vulnerabilities
- Checking Physical Security
- Performing General Security Tests
- Patching Linux
- Part V: Hacking Applications
- Part VI: Security Testing Aftermath
-
Part VII: The Part of Tens
-
Chapter 20: Ten Tips for Getting Security Buy-In
- Cultivate an Ally and a Sponsor
- Don’t Be a FUDdy Duddy
- Demonstrate How the Organization Can’t Afford to Be Hacked
- Outline the General Benefits of Security Testing
- Show How Security Testing Specifically Helps the Organization
- Get Involved in the Business
- Establish Your Credibility
- Speak on Management’s Level
- Show Value in Your Efforts
- Be Flexible and Adaptable
-
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
- The Bad Guys Think Bad Thoughts, Use Good Tools, and Develop New Methods
- IT Governance and Compliance Are More than High-Level Checklist Audits
- Hacking Complements Audits and Security Evaluations
- Customers and Partners Will Ask, ‘How Secure Are Your Systems?’
- The Law of Averages Works Against Businesses
- Security Assessments Improve the Understanding of Business Threats
- If a Breach Occurs, You Have Something to Fall Back On
- In-Depth Testing Brings Out the Worst in Your Systems
- Combining the Best of Penetration Testing and Vulnerability Assessments Is What You Need
- Proper Testing Can Uncover Weaknesses That Might Go Overlooked for Years
-
Chapter 22: Ten Deadly Mistakes
- Not Getting Prior Approval
- Assuming You Can Find All Vulnerabilities During Your Tests
- Assuming You Can Eliminate All Security Vulnerabilities
- Performing Tests Only Once
- Thinking You Know It All
- Running Your Tests Without Looking at Things from a Hacker’s Viewpoint
- Not Testing the Right Systems
- Not Using the Right Tools
- Pounding Production Systems at the Wrong Time
- Outsourcing Testing and Not Staying Involved
-
Appendix: Tools and Resources
- Advanced Malware
- Bluetooth
- Certifications
- Databases
- Denial of Service Protection
- Exploits
- General Research Tools
- Hacker Stuff
- Keyloggers
- Laws and Regulations
- Linux
- Live Toolkits
- Log Analysis
- Messaging
- Miscellaneous
- Mobile
- Networks
- Password Cracking
- Patch Management
- Security Education and Learning Resources
- Security Methods and Models
- Social Enginering and Phishing
- Source Code Analysis
- Statistics
- Storage
- System Hardening
- User Awareness and Training
- Voice over IP
- Vulnerability Databases
- Websites and Applications
- Windows
- Wireless Networks
-
Chapter 20: Ten Tips for Getting Security Buy-In
- About the Author
- Cheat Sheet
- Connect with Dummies
- End User License Agreement
Product information
- Title: Hacking For Dummies, 5th Edition
- Author(s):
- Release date: December 2015
- Publisher(s): For Dummies
- ISBN: 9781119154686
You might also like
book
Hacking For Dummies, 6th Edition
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to …
book
Hacking For Dummies, 7th Edition
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, …
book
Hacking Web Intelligence
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the …
book
The Hardware Hacker
The Hardware Hacker is an illuminating career retrospective from Andrew "bunnie" Huang, one of the world's …