Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

  • 17h 21m
  • André Zingsheim, Frank Neugebauer, Klaus Gebeshuber, Markus Widl, Matthias Wübbeling, Michael Kofler, Peter Kloep, Roland Aigner, Stefan Kania, Thomas Hackner, Tobias Scheible
  • Rheinwerk Publishing Inc.
  • 2023

Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!

  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more

Who This Book Is For

Developers who have worked on web technologies and want to learn how to build serverless applications and developers interested in making powerful applications using AWS that can then be wired using AWS Amplify.

About the Author

Michael Kofler is a renowned author of German IT publications. He works as an administrator and software developer, and is also a lecturer at a technical college. Michael is the driving force behind Hacking & Security, having written a number of its chapters, recruited its author team, designed the book, and supervised its writing as editor.

Klaus Gebeshuber is the professor of IT security at FH JOANNEUM, University of Applied Sciences in Kapfenberg, Austria. His focus is on network security, industrial security, security analysis, and penetration testing. He holds numerous industry certificates in the field of IT security, network security, and penetration testing. He is the author of four chapters of this book, covering the topics of exploits, security in wireless networks (WLAN/Bluetooth), security in web applications, and handling passwords.

Peter Kloep is an expert of secure Microsoft Windows infrastructures in German-speaking countries. He has been a Microsoft Certified Trainer since 2002 and has held numerous technical training courses on Windows administration since then. He is also a Microsoft Certified Software Engineer and Microsoft Certified Solutions Master - Windows Server 2012. He has been with Microsoft for five years as a Premier field engineer and supports Premier customers in the areas of identity management and security.

Frank Neugebauer worked in IT security for more than 25 years as an officer in the German Armed Forces. He was also employed as an IT security officer for various departments in Germany and abroad, a systems engineer at a NATO headquarters, and head of an incident response team. As a member of the German Armed Forces' Computer Emergency Response Team, he played a key role in analyzing vulnerabilities in many German Armed Forces networks. Most recently, he was employed as an incident handler at the Bundeswehr Cyber ​​Security Center. He retired at the end of 2017 and currently works as a consultant and external collaborator.

André Zingsheim works as a senior security consultant at TÜV TRUST IT GmbH. In addition to technical security analyzes and penetration tests of IT systems and infrastructures, he deals intensively with the security of mobile devices. He is a penetration tester certified by the Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security). He brings his hacking and security know-how in the field of smartphones to the book.

Thomas Hackner is senior security consultant and managing director of HACKNER Security Intelligence GmbH, which he founded in 2010 after studying secure information systems in Hagenberg, Upper Austria. He also works on international projects in which both IT networks and web applications as well as SCADA systems are checked for security in the form of penetration tests. In his three chapters of this book, he explains the objectives and implementation of penetration tests.

Markus Widl has been working as a consultant, developer, and trainer in IT for more than 20 years. His focus is on cloud technologies such as MS Office 365 and Microsoft Azure. He has made a name for himself through his expert workshops, conference contributions, and authorship. In Hacking & Security he shows how to avoid security problems when using Microsoft's cloud products.

Roland Aigner is an expert in secure IoT infrastructures. He developed firmware and software for medical in-vitro diagnostics, is a co-author of the Bluetooth SIG, and a founding member of the NFC Forum, where he was specifically responsible for ticketing and communication security. He works as a software manager in the access control area and as a consultant for IoT projects. He contributed the IoT chapter to the book.

Stefan Kania has been a freelance consultant and trainer since 1997. His focus is on the secure implementation of Samba and LDAP as well as training on both topics.

Tobias Scheible is a research associate at Albstadt-Sigmaringen University. There he works as a lecturer in the university certificate program at the Institut für wissenschaftliche Weiterbildung (IWW) (Institute for Scientific Continuing Education) and holds extra-occupational modules in the areas of network security, Internet technologies, and IT forensics. In addition, he holds lectures and workshops for associations and companies, including open events for the VDI. He writes with great passion about IT security topics in his blog scheible.it. His focus is on IT security hardware, web application security, web forensics, and user-centered didactics.

Matthias Wübbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic advisor at the University of Bonn and a scientist at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft. With the spin-off Identeco, he checks for stolen identity data to protect employee accounts as well as customer accounts and payment defaults due to identity fraud. In this book he describes the use of Snort for intrusion detection.

In this Book

  • Introduction
  • Kali Linux
  • Setting Up the Learning Environment: Metasploitable, Juice Shop
  • Hacking Tools
  • Offline Hacking
  • Passwords
  • IT Forensics
  • Wi-Fi, Bluetooth, and SDR
  • Attack Vector USB Interface
  • External Security Checks
  • Penetration Testing
  • Securing Windows Servers
  • Active Directory
  • Securing Linux
  • Security of Samba File Servers
  • Intrusion Detection Systems
  • Security of Web Applications
  • Software Exploitation
  • Bug Bounty Programs
  • Security in the Cloud
  • Securing Microsoft 365
  • Mobile Security
  • Internet of Things Security
  • Service Pages
  • Legal Notes
  • The Document Archive
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)