Ethical Hacking

by Daniel Graham

Ethical Hacking

  • ISBN-13: 9781718501874
  • Author(s): Daniel Graham
  • Subject: Computer programming / software development
  • Publisher: Penguin Random House Group
  • Imprint: No Starch Press
  • Publication Date: 04-11-2021
  • Format: p/b

Availability: In stock

£44.99
This introduction to hacking covers everything you need to know to start your own journey to becoming an ethical hacker. With help from a lab setup that lets you hack along to each chapter, this book walks you through a variety of the most useful activities for any hacker. You'll begin by capturing and viewing a victim's traffic, then learn how to encrypt files and fake emails, and craft sophisticated social engineering attacks. In the later chapters, you'll learn how to fuzz, write trojans and rootkits, and perform website exploitation. Along the way, you'll develop a fundamental understanding of technologies like network protocols, websites, and the Linux operating system. You'll also work with tools used by professional penetration testers, such as Metasploit and Wireshark, and go from setting up a virtual lab environment for small scale hacks that could take place in a coffee shop to expanding this skill in order to take over an extensive corporate network. This manual is a must f
About the book

This introduction to hacking covers everything you need to know to start your own journey to becoming an ethical hacker. With help from a lab setup that lets you hack along to each chapter, this book walks you through a variety of the most useful activities for any hacker. You'll begin by capturing and viewing a victim's traffic, then learn how to encrypt files and fake emails, and craft sophisticated social engineering attacks. In the later chapters, you'll learn how to fuzz, write trojans and rootkits, and perform website exploitation. Along the way, you'll develop a fundamental understanding of technologies like network protocols, websites, and the Linux operating system. You'll also work with tools used by professional penetration testers, such as Metasploit and Wireshark, and go from setting up a virtual lab environment for small scale hacks that could take place in a coffee shop to expanding this skill in order to take over an extensive corporate network. This manual is a must f