Chapter Download

Hacking methodology: Chapter 4 of "Hacking for Dummies"

Hacking for Dummies, 3rd Edition

Ethical hacking starts with a plan, so it's important to hone in on the best techniques to make your attack error-free. This excerpt from Hacking for Dummies, 3rd Edition by Kevin Beaver presents the steps to efficient ethical hacking, with details on how you can scan your organization and network for weaknesses.

"Before you dive in head first with your ethical hacking, it's critical to have at least a basic methodology to work from. Ethical hacking involves more than just penetrating and patching a system or network. Proven techniques can help guide you along the hacking highway and ensure that you end up at the right destination. Using a methodology that supports your ethical hacking goals separates the professionals from the amateurs and helps ensure that you make the most of your time and effort."
-- Kevin Beaver, IT security consultant and author

CHAPTER 4 -- Hacking methodology

The complete book, Hacking for Dummies, 3rd Edition, is now available for purchase from Wiley Publishing. For more information, check out our podcast with Kevin on how ethical hacking fits into Windows Security tests.

This chapter excerpt was posted with permission from Wiley Publishing, Inc..

Kevin Beaver is an information security consultant, keynote speaker, and expert witness with Atlanta-based Principle Logic, LLC where he specializes in performing independent security assessments. Kevin has authored/co-authored eight books on information security. He's also the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at his website

This was first published in September 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: