Nouveauté

Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies

Par : Dale Meredith
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
  • Non compatible avec un achat hors France métropolitaine
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN978-93-6589-842-2
  • EAN9789365898422
  • Date de parution15/07/2025
  • Protection num.Adobe DRM
  • Infos supplémentairesepub
  • ÉditeurBPB Publications

Résumé

DESCRIPTION Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you through the entire hacking lifecycle, starting with fundamental rules and engagement phases, then moving into extensive reconnaissance using public data, search engines, and social networks to gather intelligence.
You will learn active network scanning for live systems, port identification, and vulnerability detection, along with advanced enumeration techniques like NetBIOS, SNMP, and DNS. It also proceeds to explain practical system, exploitation, covering password cracking, social engineering, and specialized tools. It also includes dedicated sections on Wi-Fi network hacks, followed by crucial post-exploitation strategies for maintaining access and meticulously covering your tracks to remain undetected.
This book helps you to properly protect data and systems by means of obvious explanations, practical recipes, and an emphasis on offensive tactics. Perfect for novices or experienced professionals with a networking background, it is your go-to tool for mastering cybersecurity and keeping hackers at bay, because slowing them down is the name of the game. WHAT YOU WILL LEARN? Use Nmap to scan networks and spot vulnerabilities in a quick manner.? Crack passwords with tools like Hashcat and John.? Exploit systems using Metasploit to test your defenses. ? Secure Wi-Fi by hacking it with Aircrack-ng first.? Think like a hacker to predict and block attacks.? Learn maintaining system access by hiding tracks and creating backdoors.
WHO THIS BOOK IS FORThis book is for IT administrators and security professionals aiming to master hacking techniques for improved cyber defenses. To fully engage with these strategies, you should be familiar with fundamental networking and hacking technology concepts. 
DESCRIPTION Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you through the entire hacking lifecycle, starting with fundamental rules and engagement phases, then moving into extensive reconnaissance using public data, search engines, and social networks to gather intelligence.
You will learn active network scanning for live systems, port identification, and vulnerability detection, along with advanced enumeration techniques like NetBIOS, SNMP, and DNS. It also proceeds to explain practical system, exploitation, covering password cracking, social engineering, and specialized tools. It also includes dedicated sections on Wi-Fi network hacks, followed by crucial post-exploitation strategies for maintaining access and meticulously covering your tracks to remain undetected.
This book helps you to properly protect data and systems by means of obvious explanations, practical recipes, and an emphasis on offensive tactics. Perfect for novices or experienced professionals with a networking background, it is your go-to tool for mastering cybersecurity and keeping hackers at bay, because slowing them down is the name of the game. WHAT YOU WILL LEARN? Use Nmap to scan networks and spot vulnerabilities in a quick manner.? Crack passwords with tools like Hashcat and John.? Exploit systems using Metasploit to test your defenses. ? Secure Wi-Fi by hacking it with Aircrack-ng first.? Think like a hacker to predict and block attacks.? Learn maintaining system access by hiding tracks and creating backdoors.
WHO THIS BOOK IS FORThis book is for IT administrators and security professionals aiming to master hacking techniques for improved cyber defenses. To fully engage with these strategies, you should be familiar with fundamental networking and hacking technology concepts.