• Chapter 16 you’ll learn essential scheduling skills in order to automate your hacking scripts. Chapter 17
  • What Is Ethical Hacking
  • Penetration Testing
  • L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t h




    Download 7,3 Mb.
    Pdf ko'rish
    bet16/125
    Sana14.05.2024
    Hajmi7,3 Mb.
    #232858
    1   ...   12   13   14   15   16   17   18   19   ...   125
    Bog'liq
    linuxbasicsforhackers

    xxiii
    Chapter 14
    deals with wireless networks. You’ll learn basic networking 
    commands, then crack Wi-Fi access points and detect and connect to 
    Bluetooth signals.
    Chapter 15
    dives deeper into Linux itself with a high level view of how 
    the kernel works and how its drivers can be abused to deliver malicious 
    software. In 
    Chapter 16
    you’ll learn essential scheduling skills in order to 
    automate your hacking scripts. 
    Chapter 17
    will teach you core Python con-
    cepts, and you’ll script two hacking tools: a scanner to spy on TCP/IP con-
    nections, and a simple password cracker.
    What Is Ethical Hacking?
    With the growth of the information security field in recent years has come 
    dramatic growth in the field of ethical hacking, also known as white hat 
    (good guy) hacking. Ethical hacking is the practice of attempting to infil-
    trate and exploit a system in order to find out its weaknesses and better 
    secure it. I segment the field of ethical hacking into two primary compo-
    nents: penetration testing for a legitimate information security firm and 
    working for your nation’s military or intelligence agencies. Both are rapidly 
    growing areas, and demand is strong.
    Penetration Testing
    As organizations become increasingly security conscious and the cost of 
    security breaches rises exponentially, many large organizations are begin-
    ning to contract out security services. One of these key security services is 
    penetration testing. A penetration test is essentially a legal, commissioned 
    hack to demonstrate the vulnerability of a firm’s network and systems.
    Generally, organizations conduct a vulnerability assessment first to find 
    potential vulnerabilities in their network, operating systems, and services. I 
    emphasize potential, as this vulnerability scan includes a significant number 
    of false positives (things identified as vulnerabilities that really are not). It is 
    the role of the penetration tester to attempt to hack, or penetrate, these vul-
    nerabilities. Only then can the organization know whether the vulnerability 
    is real and decide to invest time and money to close the vulnerability.

    Download 7,3 Mb.
    1   ...   12   13   14   15   16   17   18   19   ...   125




    Download 7,3 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t h

    Download 7,3 Mb.
    Pdf ko'rish