Recommended Books: Hacker tips: Practical Guide to penetration testing, _ PHP Tutorial

Source: Internet
Author: User
Recommended Books: Hacker tips: Practical Guide to penetration testing. Good book recommendation: Hacker tips: Practical Guide to penetration testing, content introduction the so-called penetration testing is to use a variety of vulnerability scanning tools, by simulating hacker attack methods, to recommend a good book: hacker secret: Practical Guide to penetration testing,

Introduction‍‍

Penetration testing uses various vulnerability scanning tools to evaluate network security by simulating hacker attack methods.

This book uses a large number of real cases and philatelic help suggestions to explain some of the obstacles that will be faced during the penetration test and the corresponding solutions. This book is divided into 10 chapters, covering the installation and configuration of attacking machines/tools involved in this book, network scanning, vulnerability exploitation, and manual searching for Web application vulnerabilities, knowledge about how to obtain more important information, social engineering skills, physical access attacks, anti-virus software methods, password cracking tips, and final results after attacking the system.

This book is well-organized and its chapters are directly independent of each other. readers can read as needed or chapter by chapter. This book does not require readers to have a background in penetration testing, but it is helpful to understand the content of this book if they have relevant experience.

Author profile‍‍

Peter Kim, CEO and chairman of Secure Planet, has nearly 10 years of experience in the security field and has been engaged in penetration testing for the past seven years. He has taught penetration testing and network security courses at Howard Community College in Maryland and has a large number of security-related certifications.

Recommendation Index

Amazon, the most well-known penetration testing book in the market, ranks first in the United States for a long time and is well received. its English version of paper books sold 17000 million books within one year, and its electronic version sold 7500 copies, sales Spike all other similar penetration test books.

Spoiler: Rugby

The book describes the tactics of penetration testing based on the voice of rugby. the content of the book is as follows:

1. preparations before the competition-installation: about how to configure the attack machines and tools used in this book. 2. before serving-scan the network: Before you start, you need to scan to understand the environment you are about to face. This chapter will explore more about target information and intelligent scanning. 3. flat-vulnerability exploitation: uses the vulnerabilities found in the scan to attack the system. From now on, we have taken action. 4. Transfer-artificial detection technology for Web applications: sometimes, you need to make full use of your ideas to find open targets. We will look at how to manually find and attack Web applications. 5. Cross-pass-penetration over the intranet: how to obtain more important information through the network after a system is attacked. 6. assist-social engineering: puzzles the enemy through performances. This chapter will explain some social engineering skills. 7. short pass-attacks requiring physical access: a pretty short kick that requires a very close distance. This section describes the attacks that require physical access. 8. split-guard breakthrough-avoids anti-virus detection: when you are very close to each other, the attack is awesome. In most cases, you may face obstruction from anti-virus software. To solve this problem, this chapter describes how to avoid the virus. 9. special team-cracking, exploitation, and skills: cracking passwords, exploiting vulnerabilities, and some tips. 10. post-game analysis report: competition process analysis and result report. 11. Continuing Education: share with readers some things necessary to improve the penetration test level, such as attending security meetings, attending training courses, reading related books, studying vulnerability frameworks, and participating in CTF competitions.

Hacker, content introduction the so-called penetration test, is to use a variety of vulnerability scanning tools, by simulating hacker attack methods...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.