Hacking For Dummies

Front Cover
John Wiley & Sons, Dec 16, 2015 - Computers - 408 pages
Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.

Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.

  • Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks
  • Develop an effective ethical hacking plan that keeps your system safe
  • Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies
  • Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure

Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.

 

What people are saying - Write a review

User Review - Flag as inappropriate

I AM A HACKER SO NO!!!!!!!!!!

Contents

Foreword
xv
Putting Security Testing in Motion 59
6
Building the Foundation for Security Testing
9
Cracking the Hacker Mindset
25
Developing Your Ethical Hacking Plan
37
Hacking Methodology
49
Building the Foundation for Security Testing 7
50
Information Gathering 61 Chapter 6 Social Engineering
67
Linux
231
Hacking Applications
253
Hacking Applications
256
Communication and Messaging Systems 255 Chapter 15 Web Applications and Mobile Apps
279
Databases and Storage Systems
305
Security Testing Aftermath
317
Security Testing Aftermath
320
Plugging Security Holes
325

Physical Security
83
Passwords
93
Hacking Network Hosts
121
Hacking Network Hosts
124
Network Infrastructure Systems 123 Chapter 10 Wireless Networks 159 Chapter 11 Mobile Devices 187 Part IV Hacking Operating Systems
201
Exploiting Missing Patches
220
Managing Security Processes
331
The Part of Tens
339
Ten Deadly Mistakes
351
Tools and Resources
355
Index
373
Copyright

Other editions - View all

Common terms and phrases

About the author (2015)

Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta, GA-based Principle Logic, LLC. You can connect with Kevin through his website www.principlelogic.com and on Twitter at @kevinbeaver.

Bibliographic information