1. Introduction to hacking -- 2. Linux basics -- 3. Information gathering techniques -- 4. Target enumeration and port scanning techniques -- 5. Vulnerability assessment -- 6. Network sniffing -- 7. Remote exploitation -- 8. Client side exploitation -- 9. Postexploitation -- 10. Windows exploit development basics -- 11. Wireless hacking -- 12. Web hacking.
This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. -- Provided by publisher..