Table of Contents
Preface
Part 1: Information Gathering and Reconnaissance
1
Ethical Hacking Concepts
Technical requirements
What is ethical hacking?
Elements of information security
Why do intrusions and attacks happen?
Motive
Means
Opportunity
Types and profiles of attackers and defenders
Black hat hackers
Script kiddies
Hacktivists
Cyber terrorists/cyber warriors
Cyber criminals
White hat hackers
Attack targets and types
Network
Application
Host
The anatomy of an attack
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions on objectives
Ethical hacking and penetration testing
Defensive technologies
Lab – setting up the testing lab
Setting up VirtualBox
Setting up Kali Linux
Setting up vulnerable hosts ...
Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.