nostarch.com Open in urlscan Pro
2606:4700:10::6814:782e  Public Scan

URL: https://nostarch.com/ethical-hacking
Submission: On August 09 via manual from FR — Scanned from FR

Form analysis 3 forms found in the DOM

POST /ethical-hacking

<form action="/ethical-hacking" method="post" id="search-api-page-search-form-site-search" accept-charset="UTF-8">
  <div>
    <div class="form-item form-item-keys-2 form-type-textfield form-group"><input placeholder="Search" class="form-control form-text" type="text" id="edit-keys-2" name="keys_2" value="" size="15" maxlength="128"> <label
        class="control-label element-invisible" for="edit-keys-2">Enter your keywords</label>
    </div><input type="hidden" name="id" value="2">
    <button class="icon glyphicon glyphicon-search btn-primary form-control btn form-submit" type="submit" id="edit-submit-2" name="op" value=""></button>
    <input type="hidden" name="form_build_id" value="form-cPcv1F1WObkX15sPqsMH7wlN0vmZ8GGRD0r5Tz3fgR0">
    <input type="hidden" name="form_id" value="search_api_page_search_form_site_search">
  </div>
</form>

POST /ethical-hacking

<form action="/ethical-hacking" method="post" id="search-api-page-search-form-site-search" accept-charset="UTF-8">
  <div>
    <div class="form-item form-item-keys-2 form-type-textfield form-group"><input placeholder="Search" class="form-control form-text" type="text" id="edit-keys-2" name="keys_2" value="" size="15" maxlength="128"> <label
        class="control-label element-invisible" for="edit-keys-2">Enter your keywords</label>
    </div><input type="hidden" name="id" value="2">
    <button class="icon glyphicon glyphicon-search btn-primary form-control btn form-submit" type="submit" id="edit-submit-2" name="op" value=""></button>
    <input type="hidden" name="form_build_id" value="form-cPcv1F1WObkX15sPqsMH7wlN0vmZ8GGRD0r5Tz3fgR0">
    <input type="hidden" name="form_id" value="search_api_page_search_form_site_search">
  </div>
</form>

POST /ethical-hacking

<form action="/ethical-hacking" method="post" id="uc-product-add-to-cart-form-609" accept-charset="UTF-8">
  <div>
    <div id="uc_product_add_to_cart_form-609-attributes" class="attributes">
      <div class="attribute attribute-1 odd">
        <div class="form-item form-item-attributes-1 form-type-radios form-group">
          <div id="edit-attributes-1" class="form-radios">
            <div class="form-item form-item-attributes-1 form-type-radio radio"> <label class="control-label" for="edit-attributes-1-3"><input type="radio" id="edit-attributes-1-3" name="attributes[1]" value="3" checked="checked"
                  class="form-radio">Print Book and FREE Ebook, $49.99</label>
            </div>
            <div class="form-item form-item-attributes-1 form-type-radio radio"> <label class="control-label" for="edit-attributes-1-2"><input type="radio" id="edit-attributes-1-2" name="attributes[1]" value="2" class="form-radio">Ebook (PDF, Mobi,
                and ePub), $39.99</label>
            </div>
          </div>
        </div>
      </div>
    </div><input type="hidden" name="qty" value="1">
    <input type="hidden" name="form_build_id" value="form-zNLbmk37M0Z54IJE6vn7wWwXuqCPrz0hM-dJVmYdSXA">
    <input type="hidden" name="form_id" value="uc_product_add_to_cart_form_609">
    <div class="form-actions form-wrapper form-group" id="edit-actions"><button class="node-add-to-cart btn btn-success form-submit icon-before" type="submit" id="edit-submit-609" name="op" value="Add to cart"><span
          class="icon glyphicon glyphicon-plus" aria-hidden="true"></span> Add to cart</button>
    </div>
  </div>
</form>

Text Content

Skip to main contentEnable accessibility for visually impairedOpen the
accessibility menu






This website uses cookies to improve your experience. Learn More
Got It
Skip to main content
Toggle navigation
 * Catalog
 * Merchandise
 * Blog
 * Early Access
 * Write for Us
 * About Us
 * Contact Us

Enter your keywords
Enter your keywords
 * Catalog
 * Merchandise
 * Blog
 * Early Access
 * Write for Us
 * About Us
 * Contact Us

Topics


TOPICS

 * Art & Design
 * General Computing
 * Hacking & Computer Security
 * Hardware / DIY
 * Kids
 * LEGO®
 * Linux & BSD
 * Manga
 * Programming
 * Python
 * Science & Math
 * Scratch
 * System Administration
 * Early Access


FREE ebook edition with every print book purchased from nostarch.com!

+

EARLY ACCESS lets you read full chapters months before a title's release date!


SHOPPING CART

There are no products in your shopping cart.

0 ItemsTotal: $0.00


USER LOGIN

 * Log in
 * Create account




ETHICAL HACKING

A Hands-on Introduction to Breaking In
by Daniel G. Graham
October 2021, 376 pp.
ISBN-13: 
9781718501874
Print Book and FREE Ebook, $49.99
Ebook (PDF, Mobi, and ePub), $39.99
Add to cart
 * Contents
 * Reviews
 * Updates

Download Chapter 2: CAPTURING TRAFFIC WITH ARP SPOOFING



You can find the book's downloadable code files on GitHub.

Ethical Hacking is a crash course in modern hacking techniques. It's already
being used to prepare the next generation of offensive security experts. In its
many hands-on labs, you’ll explore crucial skills for any aspiring penetration
tester, security researcher, or malware analyst.

You’ll begin with the basics: capturing a victim’s network traffic with an ARP
spoofing attack and then viewing it in Wireshark. From there, you’ll deploy
reverse shells that let you remotely run commands on a victim’s computer,
encrypt files by writing your own ransomware in Python, and fake emails like the
ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz
for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL
injection, and escalate your privileges to extract credentials, which you’ll use
to traverse a private network.

You’ll work with a wide range of professional penetration testing tools—and
learn to write your own tools in Python—as you practice tasks like:

 * Deploying the Metasploit framework’s reverse shells and embedding them in
   innocent-seeming files
 * Capturing passwords in a corporate Windows network using Mimikatz
 * Scanning (almost) every device on the internet to find potential victims
 * Installing Linux rootkits that modify a victim’s operating system
 * Performing advanced Cross-Site Scripting (XSS) attacks that execute
   sophisticated JavaScript payloads

Along the way, you’ll gain a foundation in the relevant computing technologies.
Discover how advanced fuzzers work behind the scenes, learn how internet traffic
gets encrypted, explore the inner mechanisms of nation-state malware like
Drovorub, and much more.

Developed with feedback from cybersecurity students, Ethical Hacking addresses
contemporary issues in the field not often covered in other books and will
prepare you for a career in penetration testing. Most importantly, you’ll be
able to think like an ethical hacker⁠: someone who can carefully analyze systems
and creatively gain access to them.

Want to ask questions about the book? Contact the author at:
discord.thehackingbook.com


Author Bio 

Dr. Daniel G. Graham is an Assistant Professor of Computer Science at The
University of Virginia in Charlottesville, Virginia. His research interests
include secure embedded systems and networks. Before teaching at UVA, Dr. Graham
was a Program Manager at Microsoft in Seattle, Washington. He publishes in IEEE
journals relating to sensors and networks.

Table of contents 

Foreword by Juan Gilbert
Chapter 1: Setting Up
PART I: NETWORK FUNDAMENTALS
Chapter 2: Capturing Traffic with ARP Spoofing
Chapter 3: Analyzing Captured Traffic
Chapter 4: Crafting TCP Shells and Botnets
PART II: CRYPTOGRAPHY
Chapter 5: Cryptography and Ransomware
Chapter 6: TLS & Diffie-Hellman
PART III: SOCIAL ENGINEERING
Chapter 7: Phishing and Deepfakes
Chapter 8: Scanning Targets
PART IV: EXPLOITATION
Chapter 9: Fuzzing for Zero-Day Vulnerabilities
Chapter 10: Building Trojans
Chapter 11: Building and Installing Linux Rootkits
Chapter 12: Stealing and Cracking Passwords
Chapter 13: Serious Cross-Site Scripting Exploitation
PART V: CONTROLLING THE NETWORK
Chapter 14: Pivoting and Privilege Escalation
Chapter 15: Moving Through the Corporate Windows Network
Chapter 16: Next Steps

View the Copyright page
View the detailed Table of Contents
View the Index

Reviews 

"Ethical Hacking is great! I've been using it in my Computer Science,
Cybersecurity and Machine Learning high-school classrooms. I really love the
idea of having a VM lab that kids can understand and use. Well done!"
—William Heldman PhD, Technology Educator

"Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is
on my list for book recommendations for those interested and new to cyber. Very
well detailed and simple enough for most to understand. Another great book
published by No Starch Press."
—Jered Bare, @jeredbare

"Ethical Hacking is filled with great exercises that give you a much deeper
understanding of important, complicated topics by having you go through the
details of implementation. Making deep fakes, implementing a botnet and other
topics are enlightening, lots of fun and will help you defend against these
threats, possibly by also helping you find bugs and issues which can disable
them!"
—Jamie G., Advanced Reviewer

"Good for beginners in cybersecurity, ethical hacking and offensive security. .
. . 4.5 / 5.0"
—Uday Mittal, Cybersecurity Professional

Updates 

View the latest errata.

 * share
 * print
 * tweet


NAVIGATION

 * My account

Want sweet deals?
Sign up for our newsletter.


YOU MIGHT ALSO LIKE...



About Us  |  Jobs!  |  Sales and Distribution  |  Rights  |  Media  |  Academic
Requests  |  Conferences  |  FAQ  |  Contact Us  |  Write for Us  |  Privacy

Copyright 2023. No Starch Press, Inc