This is the code repository for Hands-On Ethical Hacking Tactics, published by Packt.
Strategies, tools, and techniques for effective cyber defense
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.
This book covers the following exciting features:
- Understand the core concepts and principles of ethical hacking
- Gain hands-on experience through dedicated labs
- Explore how attackers leverage computer systems in the digital landscape
- Discover essential defensive technologies to detect and mitigate cyber threats
- Master the use of scanning and enumeration tools
- Understand how to hunt and use search information to identify attacks
If you feel this book is for you, get your copy today!
All of the code is organized into folders. For example, Chapter02.
The code will look like the following:
User-agent: *
Disallow /
Following is what you need for this book: Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.
With the following software and hardware list you can run all code files present in the book (Chapter 1-14).
Chapter | Software required | OS required |
---|---|---|
1-14 | Virtual Box | Windows, macOS, or Linux (Intel-based) No Apple M1+ machines |
1-14 | Vagrant | Windows, Mac OS X, and Linux (Any) |
1-14 | Metasploit | Windows, Mac OS X, and Linux (Any) |
-
Penetration Testing Azure for Ethical Hackers [Packt] [Amazon]
-
Building and Automating Penetration Testing Labs in the Cloud [Packt] [Amazon]
Shane Hartman , a seasoned professional with over 20 years in the computer security industry, currently serves as the Senior IR Consultant at TrustedSec. Holding a Bachelors's degree in Business/EBusiness from the University of Phoenix and a Masters's in Digital Forensics from the University of Central Florida, Shane brings a wealth of academic and practical expertise to the field. With a notable CISSP certification and prior credentials including MCSE, GREM, and GCIA, he has been actively engaged in the security discipline since 2005. Shane's extensive experience, coupled with a strong educational background, positions him as a leading authority in the dynamic realm of cybersecurity.