19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

x<br />

Hacking For Dummies, 4th Edition<br />

Using the Ethical Hacking Process ..............................................................18<br />

Formulating your plan .........................................................................19<br />

Selecting tools ......................................................................................20<br />

Executing the plan ...............................................................................22<br />

Evaluating results ................................................................................23<br />

Moving on .............................................................................................23<br />

Chapter 2: Cracking the Hacker Mindset . . . . . . . . . . . . . . . . . . . . . . . . .25<br />

What You’re Up Against ................................................................................25<br />

Who Breaks into Computer Systems ..........................................................27<br />

Why They Do It ..............................................................................................29<br />

Planning and Performing Attacks ................................................................32<br />

Maintaining Anonymity .................................................................................34<br />

Chapter 3: Developing Your Ethical Hacking Plan . . . . . . . . . . . . . . . . .35<br />

Establishing Your Goals ................................................................................36<br />

Determining Which Systems to Hack ..........................................................38<br />

Creating Testing Standards ..........................................................................40<br />

Timing....................................................................................................41<br />

Running specific tests .........................................................................41<br />

Blind versus knowledge assessments ...............................................42<br />

Picking your location ...........................................................................43<br />

Responding to vulnerabilities you find .............................................43<br />

Making silly assumptions ....................................................................44<br />

Selecting Security Assessment Tools ..........................................................44<br />

Chapter 4: Hacking Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47<br />

Setting the Stage for Testing ........................................................................47<br />

Seeing What Others See ................................................................................49<br />

Gathering public information .............................................................49<br />

Mapping the network ..........................................................................52<br />

Scanning Systems ..........................................................................................54<br />

Hosts ......................................................................................................55<br />

Open ports ............................................................................................55<br />

Determining What’s Running on Open Ports .............................................56<br />

Assessing Vulnerabilities ..............................................................................58<br />

Penetrating the System .................................................................................61<br />

Part II: Putting Ethical Hacking in Motion ................... 63<br />

Chapter 5: Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65<br />

Introducing Social Engineering ....................................................................65<br />

Starting Your First Social Engineering Tests ..............................................66<br />

Why Attackers Use Social Engineering .......................................................68<br />

Understanding the Implications ..................................................................69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!