Hacking For DummiesLearn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.
Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list. |
What people are saying - Write a review
I AM A HACKER SO NO!!!!!!!!!!
Contents
xv | |
Putting Security Testing in Motion 59 | 6 |
Building the Foundation for Security Testing | 9 |
Cracking the Hacker Mindset | 25 |
Developing Your Ethical Hacking Plan | 37 |
Hacking Methodology | 49 |
Building the Foundation for Security Testing 7 | 50 |
Information Gathering 61 Chapter 6 Social Engineering | 67 |
Linux | 231 |
Hacking Applications | 253 |
Hacking Applications | 256 |
Communication and Messaging Systems 255 Chapter 15 Web Applications and Mobile Apps | 279 |
Databases and Storage Systems | 305 |
Security Testing Aftermath | 317 |
Security Testing Aftermath | 320 |
Plugging Security Holes | 325 |
Physical Security | 83 |
Passwords | 93 |
Hacking Network Hosts | 121 |
Hacking Network Hosts | 124 |
Network Infrastructure Systems 123 Chapter 10 Wireless Networks 159 Chapter 11 Mobile Devices 187 Part IV Hacking Operating Systems | 201 |
Exploiting Missing Patches | 220 |