Hacking For Dummies. Kevin Beaver
367
361 368
362 369
363 370
364 371
365 372
366 373
367 374
368 375
369 376
370 377
371 378
372 379
373 380
374 381
375 382
376 383
377 384
378 385
379 386
380 387
381 388
382 389
383 390
384 391
385 392
386 393
387 394
388 395
389 396
390 397
391 398
392 399
393 400
394 401
Introduction
Welcome to Hacking For Dummies, 7th Edition. This book outlines — in plain English — computer hacking tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I refer to as vulnerability and penetration testing or ethical hacking throughout the book.
Computer and network security is a complex subject and an ever-moving target. You must stay on top of it to ensure that your information is protected from the bad guys and their exploits, including the growing challenges associated with ransomware. The techniques and tools outlined in this book can help.
You could implement all the security technologies and other best practices possible, and your network environment might be secure — as far as you know. But unless and until you understand how malicious attackers think, apply that knowledge, and use the right tools to assess your systems from their point of view, it’s practically impossible to have a true sense of how secure your systems and information really are.
Ethical hacking (or, more simply, security assessments), which encompasses formal and methodical vulnerability and penetration testing, is necessary to find security flaws and to validate that your information systems are truly secure on an ongoing basis.
Given the COVID-19 situation, ensuring security is especially critical today. With so many people working from home and outside the traditional enterprise network security controls, hacking and related breaches are off the charts. It’s clear that businesses are having to adapt to new ways of working. IT and security professionals are also grappling with the associated emerging technologies, and that’s only further complicating security. It’s a tricky place to be and not an enviable position. Still, it represents an opportunity for learning and improving, so it’s not all bad.
This book will help you successfully navigate the craziness of the world as it relates to IT and security. I’ll also help you implement a proper vulnerability and penetration testing program, perform the right security checks, and put the necessary countermeasures in place to keep external hackers and malicious users in check.
About This Book
Hacking For Dummies is a reference guide for hacking your systems to improve security and minimize business risks. The security testing techniques are based on written and unwritten rules of computer system vulnerability and penetration testing and information security best practices. This book covers everything from establishing your testing plan to assessing your systems to plugging the holes and managing an ongoing security testing program.
Realistically, for most networks, operating systems, and applications, thousands of possible vulnerabilities exist. I don’t cover them all, but I do cover the big ones on various platforms and systems that I believe contribute to most security problems in business today. I cover basic Pareto principle (80/20 rule) stuff, with the goal of helping you find the 20 percent of the issues that create 80 percent of your security risks. Whether you need to assess security vulnerabilities on a small home-office network, a medium-size corporate network, or across a large enterprise, Hacking For Dummies provides the information you need.
This book includes the following features:
Various technical and nontechnical tests and their detailed methodologies
Specific countermeasures to protect against hacking and breaches
Before you start testing your systems, familiarize yourself with the information in Part 1 so that you’re prepared for the tasks at hand. The adage “If you fail to plan, you plan to fail” rings true for the security assessment process. You must have a solid game plan in place if you’re going to be successful.
Foolish Assumptions
Disclaimer: This book is intended solely for information technology (IT) and information security professionals to test the security of their (or their clients’) systems in an authorized fashion. If you choose to use the information in this book to hack or break into computer systems maliciously and without authorization, you’re on your own. Neither I (the author) nor anyone else associated with this book shall be liable or responsible for any unethical or criminal choices that you might make and execute using the methodologies and tools that I describe.
Okay, now that that’s out of the way, let’s get to the good stuff! This book is for you if you’re a network administrator, IT or information security manager, security consultant, security auditor, compliance manager, or otherwise interested in finding out more about evaluating computer systems, software, and IT operations for security flaws and, of course, making long-term improvements.
I also make a few assumptions about you, the aspiring information technology (IT) or security professional:
You’re familiar with basic computer, network, and information security concepts and terms.
You have access to a computer and a network on which to use these techniques and tools.
You have the go-ahead from your employer or your client to perform the hacking techniques described in this book.
Icons Used in This Book
Throughout this book, you’ll see the following icons in the margins.
This icon points out information that’s worth committing to memory.