The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you’ve learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection