Best resources for learning pentesting (not black hat!!!)


 
Thread Tools Search this Thread
The Lounge What is on Your Mind? Best resources for learning pentesting (not black hat!!!)
# 8  
Old 06-15-2011
If someone asks you if you're a hacker, which kind would you assume they meant? I would have liked it if the term kept its good connotations too but the horse is long dead, it's not coming back.
This User Gave Thanks to Corona688 For This Post:
# 9  
Old 06-15-2011
From the Jargon File:
Quote:
hacker: n.

[originally, someone who makes furniture with an axe]

1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.

2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

[...]

7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker.
IMO there aren't black-hat or white-hat hackers, but those who try to circumvent protection features, and then advise their victim on how to do better, and those who break into systems for their own personal gain (mostly script kiddies). The former are either enthusiasts or professional security analysts. The latter are what the media commonly refers to as "hackers".
This User Gave Thanks to pludi For This Post:
# 10  
Old 06-16-2011
Quote:
Originally Posted by pludi
From the Jargon File:

Quote:
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users.
I much prefer that definition. That is much more descriptive of what it is to be a "hacker".

Also current affairs don't fill me with much hope for the word "hacker" ever being seen as something positive by the media etc.
# 11  
Old 06-16-2011
Definition is not important.

This thread was about resources to learn penetration testing. Penetration testing is a standard and well accepted skill for computer security professionals. A (boring) discussion of a well established (and never ending) argument/debate about the terms "hacker" and "cracker" are, in my opinion, a (red herring) distraction from the original poster's question.

My old friend and (ex) colleague Ed Skoudis wrote a penetration testing book (as I recall) that was quite well received. You can easily Google it.

I used to work extensively in Internet and Computer security and have had number of penetration testers work on my team. Althought penetration testing has never been of great interest to me (I tend to be more interested in security architecture), never-the-less, penetration testing is a critical skill now and for the future of Internet security.

A well-respected professional penetration tester is neither a "hacker" nor a "cracker" in my opinion; they are true security professionals.
This User Gave Thanks to Neo For This Post:
# 12  
Old 06-16-2011
Update: Here is a link to Ed's book:

Counter Hack by Ed Skoudis

I am admittedly bias, since Ed and I worked together for around a year as a "team of four" security professionals traveling the world, making the world a safer place while drinking wine and eating cheese in between gigs Smilie
This User Gave Thanks to Neo For This Post:
# 13  
Old 06-16-2011
Quote:
Originally Posted by Neo
Update: Here is a link to Ed's book:

Counter Hack by Ed Skoudis

I am admittedly bias, since Ed and I worked together for around a year as a "team of four" security professionals traveling the world, making the world a safer place while drinking wine and eating cheese in between gigs Smilie
Thanks neo, I shall check this out when I get home (can't get on amazon from here Smilie )

Quote:
Originally Posted by Neo
making the world a safer place while drinking wine and eating cheese in between gigs
Smilie
# 14  
Old 06-16-2011
From the Amazon summary:

Quote:
Editorial Reviews

Amazon.com Review

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Counter Hack aims to provide its readers with enough knowledge to toughen their Unix and Microsoft Windows systems against attacks in general, and with specific knowledge of the more common sorts of attacks that can be carried out by relatively unskilled "script kiddies." The approach author Ed Skoudis has chosen is effective, in that his readers accumulate the knowledge they need and generally enjoy the process.

The best part of this book may be two chapters, one each for Windows and Unix, that explain the essential security terms, conventions, procedures, and behaviors of each operating system. This is the sort of information that readers need--a Unix person getting into Windows administration for the first time needs an introduction to the Microsoft security scheme, and vice versa. A third chapter explains TCP/IP with focus on security. With that groundwork in place, Skoudis explains how (with emphasis on tools) attackers look for vulnerabilities in systems, gain access, and maintain their access for periods of time without being discovered. You'll probably want to search online resources for more specific information--Skoudis refers to several--but this book by itself will provide you with the vocabulary and foundation knowledge you need to get the details you want. --David Wall

Topics covered: How black-hat hackers work, what tools and techniques they use, and how to assess and improve your systems' defenses. The author explains how Windows, Unix, and TCP/IP can be exploited for nefarious purposes, and details a modus operandi that's typical of the bad guys.

Product Description

This informal, step-by-step guide will empower every network and system administrator to defend their network assets, whether or not they have security experience. It covers both Unix and Windows platforms, presenting in-depth descriptions of the inner workings of the most destructive hacker tools, and proven, step-by-step countermeasures. Skoudis begins by presenting the hacker's view of networks and their vulnerabilities, with especially detailed coverage of how hackers view the TCP/IP protocol suite. He introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for network vulnerabilities; gaining access and exploiting the system; maintaining access; and preventing detection. Counter Hack presents in-depth descriptions of the most widespread and dangerous attack scenarios, and the most widely-used hacker tools, including war dialers, port scanners, firewall scanners, sniffers, session hijackers, and more. For all system administrators, network administrators, security specialists, and others directly involved in protecting network and computing infrastructure.
This User Gave Thanks to Neo For This Post:
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Showing a black screen

Hi all, Is there a way, on the command line, to show a black screen WITHOUT turning off the monitor? Also, is there a way to make the computer show the last screen before the black screen as soon as the user interacts with it? I know that there are various ways to turn off the computer, or... (8 Replies)
Discussion started by: Zel2008
8 Replies

2. UNIX for Dummies Questions & Answers

Screen Goes Black When Run startx

Have - HP G4p DL360 SCSI version (*see below of pdf of server basics if needed) Scientific Linux live-cd.iso Issue - When it boots off the LiveCD, all starts swell, but if I install the OS normal it goes to a black monitor.... If I install text only, it works and when done I am at the... (4 Replies)
Discussion started by: sas
4 Replies

3. Shell Programming and Scripting

No delete black spaces!

Hi, I have the next problem, i am triying to concatenate two variables with white spaces at the cornes, but the shell deletes them. For example i have the next code: A="Hello " B="Hello" echo $A$B output: Hello Hello You can see only one space between the words, and i put 5... (5 Replies)
Discussion started by: Xedrox
5 Replies

4. Red Hat

Black Screen

I am using Intel HD 400 Graphics on a laptop. When I logout, I get a black screen with no cursor or anything. I have to hard reboot the system to get into linux again. Working on RHEL 6 (gnome) (1 Reply)
Discussion started by: sunveer
1 Replies

5. Solaris

free learning resources and training from Sun microsystems plus discounted Certification Voucher

Hi all, If you are interested on taking Sun microsystems training from Java to business skills , if so drop by SAI program it's free for students and Educational Institutions (0 Replies)
Discussion started by: h@foorsa.biz
0 Replies

6. Red Hat

RHCE Servers Online Learning Resources..

Anybody knows about any reliable source where i can study Linux servers while sitting at my home. A single bit of information in this regards will be highly appreciated. thanks :-) (3 Replies)
Discussion started by: salman103
3 Replies

7. Shell Programming and Scripting

Get Black Screen for 10secs

I was thinking if there is a way that i can go about making my screen go black automatically for about 10seconds, (with a message like "take a break" printed on the screen) and after 10seconds everything comes back to normal.... is there any way that i can do this...??? to further clarify the... (2 Replies)
Discussion started by: c_d
2 Replies

8. What is on Your Mind?

Invitation to Black hole !

What's on Your Mind? Come inside and relax a while. The highlighted portion is not applicable for this post, we will forget about that a little bit. CERN's experiment - on big bang Start of historic LHC collider experiment nears - Science Countdown to LHC 'Big Bang' experiment begins -... (0 Replies)
Discussion started by: matrixmadhan
0 Replies

9. Solaris

Learning solaris 10 resources

This is my site and i hope it is useful for unix beginner http://www.learning-solaris.com (0 Replies)
Discussion started by: hoanginlove81
0 Replies

10. IP Networking

TCP/IP Black Book

hi there, i read in Amazon.com that there is this TCP/IP black book which is supposed to give a in-depth knowledge of TCP/IP. Is it the one from Microsoft ??? was wondering how the expereinced ones feel about this book ? any recommadntions on good,in--depth TCP/IP books ? thanks (3 Replies)
Discussion started by: happyfish
3 Replies
Login or Register to Ask a Question