Skip to content

PacktPublishing/Hands-On-Ethical-Hacking-Tactics

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hands-On Ethical Hacking Tactics

Hands-On Ethical Hacking Tactics

This is the code repository for Hands-On Ethical Hacking Tactics, published by Packt.

Strategies, tools, and techniques for effective cyber defense

What is this book about?

This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.

This book covers the following exciting features:

  • Understand the core concepts and principles of ethical hacking
  • Gain hands-on experience through dedicated labs
  • Explore how attackers leverage computer systems in the digital landscape
  • Discover essential defensive technologies to detect and mitigate cyber threats
  • Master the use of scanning and enumeration tools
  • Understand how to hunt and use search information to identify attacks

If you feel this book is for you, get your copy today!

https://www.packtpub.com/

Instructions and Navigations

All of the code is organized into folders. For example, Chapter02.

The code will look like the following:

User-agent: *
Disallow /

Following is what you need for this book: Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.

With the following software and hardware list you can run all code files present in the book (Chapter 1-14).

Software and Hardware List

Chapter Software required OS required
1-14 Virtual Box Windows, macOS, or Linux (Intel-based) No Apple M1+ machines
1-14 Vagrant Windows, Mac OS X, and Linux (Any)
1-14 Metasploit Windows, Mac OS X, and Linux (Any)

Related products

Get to Know the Author

Shane Hartman , a seasoned professional with over 20 years in the computer security industry, currently serves as the Senior IR Consultant at TrustedSec. Holding a Bachelors's degree in Business/EBusiness from the University of Phoenix and a Masters's in Digital Forensics from the University of Central Florida, Shane brings a wealth of academic and practical expertise to the field. With a notable CISSP certification and prior credentials including MCSE, GREM, and GCIA, he has been actively engaged in the security discipline since 2005. Shane's extensive experience, coupled with a strong educational background, positions him as a leading authority in the dynamic realm of cybersecurity.

Releases

No releases published

Packages

No packages published