Synopses & Reviews
Get out your white hat and learn where your systems may be vulnerable
You're a good guy or gal, so why do you need to learn how to hack? Because the only way to be sure your systems are secure is to find out how the bad guys work and examine your defenses from their point of view. This guide shows you how, explains common attacks, tells you what to look for, and gives you the tools to safeguard your sensitive business information.
Build the foundation — understand the value of ethical hacking, what's involved, and the malicious hacker's mindset
Games people play — discover how hackers use social engineering to breach security and what to do about it
It's the network — explore common network vulnerabilities and the creative ways they're exploited
Down and dirty OS hacking — learn how Windows, Linux, and Novell NetWare are being attacked and how to scan for vulnerabilities
Sneak attacks — see why applications, especially Web apps, are vulnerable and how to protect them
Get the message — prepare for attacks on e-mail, IM, and VoIP systems
Tools of the trade — learn about Metasploit, BackTrack, and other important security testing tools
Now what? — find out how to use the information you gather to minimize business risks
Open the book and find:
What makes a hacker hack
Why you need to hack your systems
How to gain management's approval for your ethical hacking tests
Countermeasures to common attacks
Linux and Novell NetWare risks
Techniques for defending databases
How wireless LANs are compromised
Ten deadly mistakes to avoid
Use the latest ethical hacking methods and tools
Test your Windows or Linux systems
Hack databases, VoIP systems, and Web applications
Report vulnerabilities and improve information security
Hacking For Dummies explores the malicious hacker's mindset, helps the reader develop an ethical hacking plan, and covers typical hack attacks and how to counteract them. Readers will also discover strategies for reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end users not to be victims of social engineering. Updates and new and expanded content include: Windows 7 hacks Linux hacks Web application hacks Database hacks VoIP hacks Mobile computing hacks, including laptops and smartphones Free testing tools Tools and resources appendix
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!
It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.
Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.
- Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
- Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place
- Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux
- Explains ethical hacking and why it is essential
Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.
About the Author
Kevin Beaver is an independent information security consultant, expert witness, and speaker with more than 20 years of security experience. He specializes in performing information security assessments that support compliance and risk management. He is also coauthor of Hacking Wireless Networks For Dummies.
Table of Contents
Part I: Building the Foundation for Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Cracking the Hacker Mindset.
Chapter 3: Developing Your Ethical Hacking Plan.
Chapter 4: Hacking Methodology.
Part II: Putting Ethical Hacking in Motion.
Chapter 5: Social Engineering.
Chapter 6: Physical Security.
Chapter 7: Passwords.
Part III: Hacking the Network.
Chapter 8: Network Infrastructure.
Chapter 9: Wireless LANs.
Part IV: Hacking Operating Systems.
Chapter 10: Windows.
Chapter 11: Linux.
Chapter 12: Novell NetWare.
Part V: Hacking Applications.
Chapter 13: Communication and Messaging Systems.
Chapter 14: Web Sites and Applications.
Chapter 15: Databases and Storage Systems.
Part VI: Ethical Hacking Aftermath.
Chapter 16: Reporting Your Results.
Chapter 17: Plugging Security Holes.
Chapter 18: Managing Security Changes.
Part VII: The Part of Tens.
Chapter 19: Ten Tips for Getting Upper Management Buy-In.
Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test.
Chapter 21: Ten Deadly Mistakes.
Appendix: Tools and Resources.