Have a personal or library account? Click to login
Hacking and Security Cover

Hacking and Security

The Comprehensive Guide to Penetration Testing and Cybersecurity

Paid access
|Mar 2025
Product purchase options

Explore hacking methodologies, tools, and defensive measures with this practical guide that covers topics like penetration testing, IT forensics, and security risks.

Key Features

  • Extensive hands-on use of Kali Linux and security tools
  • Practical focus on IT forensics, penetration testing, and exploit detection
  • Step-by-step setup of secure environments using Metasploitable

Book Description

This book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses. It begins by introducing key concepts, distinguishing penetration testing from hacking, and explaining hacking tools and procedures. Early chapters focus on security fundamentals, such as attack vectors, intrusion detection, and forensic methods to secure IT systems.

As the book progresses, readers explore topics like exploits, authentication, and the challenges of IPv6 security. It also examines the legal aspects of hacking, detailing laws on unauthorized access and negligent IT security. Readers are guided through installing and using Kali Linux for penetration testing, with practical examples of network scanning and exploiting vulnerabilities.

Later sections cover a range of essential hacking tools, including Metasploit, OpenVAS, and Wireshark, with step-by-step instructions. The book also explores offline hacking methods, such as bypassing protections and resetting passwords, along with IT forensics techniques for analyzing digital traces and live data. Practical application is emphasized throughout, equipping readers with the skills needed to address real-world cybersecurity threats.

What you will learn

  • Master penetration testing
  • Understand security vulnerabilities
  • Apply forensics techniques
  • Use Kali Linux for ethical hacking
  • Identify zero-day exploits
  • Secure IT systems

Who this book is for

This book is ideal for cybersecurity professionals, ethical hackers, IT administrators, and penetration testers. A basic understanding of network protocols, operating systems, and security principles is recommended for readers to benefit from this guide fully.

Table of Contents

  1. Introduction
  2. Kali Linux
  3. Setting Up the Learning Environment: Metasploitable, Juice Shop
  4. Hacking Tools
  5. Offline Hacking
  6. Passwords
  7. IT Forensics
  8. Wi-Fi, Bluetooth, and SDR
  9. Attack Vector USB Interface
  10. External Security Checks
  11. Penetration Testing
  12. Securing Windows Servers
  13. Active Directory
  14. Securing Linux
  15. Security of Samba File Servers
  16. Intrusion Detection Systems
  17. Security of Web Applications
  18. Software Exploitation
  19. Bug Bounty Programs
  20. Security in the Cloud
  21. Securing Microsoft 365
  22. Mobile Security
  23. Internet of Things Security
PDF ISBN: 978-1-83664-734-8
Publisher: Packt Publishing Limited
Copyright owner: © 2024 Packt Publishing Limited
Publication date: 2025
Language: English
Pages: 1144