Book description
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease.
- Get up to speed on Windows 10 hacks
- Learn about the latest mobile computing hacks
- Get free testing tools
- Find out about new system updates and improvements
There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.
Table of contents
- Cover
- Introduction
- Part 1: Building the Foundation for Security Testing
- Part 2: Putting Security Testing in Motion
- Part 3: Hacking Network Hosts
-
Part 4: Hacking Operating Systems
- Chapter 12: Windows
-
Chapter 13: Linux and macOS
- Understanding Linux Vulnerabilities
- Choosing Tools
- Gathering Information About Your System Vulnerabilities
- Finding Unneeded and Unsecured Services
- Securing the .rhosts and hosts.equiv Files
- Assessing the Security of NFS
- Checking File Permissions
- Finding Buffer Overflow Vulnerabilities
- Checking Physical Security
- Performing General Security Tests
- Patching
- Part 5: Hacking Applications
- Part 6: Security Testing Aftermath
-
Part 7: The Part of Tens
-
Chapter 20: Ten Tips for Getting Security Buy-In
- Cultivate an Ally and a Sponsor
- Don’t Be a FUDdy-Duddy
- Demonstrate That the Organization Can’t Afford to Be Hacked
- Outline the General Benefits of Security Testing
- Show How Security Testing Specifically Helps the Organization
- Get Involved in the Business
- Establish Your Credibility
- Speak on Management’s Level
- Show Value in Your Efforts
- Be Flexible and Adaptable
-
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
- The Bad Guys Think Bad Thoughts, Use Good Tools, and Develop New Methods
- IT Governance and Compliance Are More Than High-Level Checklist Audits
- Vulnerability and Penetration Testing Complements Audits and Security Evaluations
- Customers and Partners Will Ask How Secure Your Systems Are
- The Law of Averages Works Against Businesses
- Security Assessments Improve Understanding of Business Threats
- If a Breach Occurs, You Have Something to Fall Back On
- In-Depth Testing Brings Out the Worst in Your Systems
- Combined Vulnerability and Penetration Testing Is What You Need
- Proper Testing Can Uncover Overlooked Weaknesses
-
Chapter 22: Ten Deadly Mistakes
- Not Getting Approval
- Assuming That You Can Find All Vulnerabilities
- Assuming That You Can Eliminate All Vulnerabilities
- Performing Tests Only Once
- Thinking That You Know It All
- Running Your Tests Without Looking at Things from a Hacker’s Viewpoint
- Not Testing the Right Systems
- Not Using the Right Tools
- Pounding Production Systems at the Wrong Time
- Outsourcing Testing and Not Staying Involved
-
Chapter 20: Ten Tips for Getting Security Buy-In
-
Appendix: Tools and Resources
- Advanced Malware
- Bluetooth
- Certifications
- Databases
- Denial of Service (DoS) Protection
- Exploits
- General Research Tools
- Hacker Stuff
- Keyloggers
- Laws and Regulations
- Linux
- Live Toolkits
- Log Analysis
- Messaging
- Miscellaneous
- Mobile
- Networks
- Password Cracking
- Patch Management
- Security Education and Learning Resources
- Security Methods and Models
- Social Enginering and Phishing
- Source Code Analysis
- Statistics
- Storage
- System Hardening
- User Awareness and Training
- Voice over Internet Protocol
- Vulnerability Databases
- Websites and Applications
- Windows
- Wireless Networks
- About the Author
- Advertisement Page
- Connect with Dummies
- Index
- End User License Agreement
Product information
- Title: Hacking For Dummies, 6th Edition
- Author(s):
- Release date: July 2018
- Publisher(s): For Dummies
- ISBN: 9781119485476
You might also like
book
Hacking For Dummies, 7th Edition
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, …
book
Hacking Exposed 7, 7th Edition
The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. …
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
book
Cybersecurity For Dummies
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or …