O'Reilly logo

Penetration Testing: Protecting Networks and Systems by Kevin M. Henry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2: PREPARING TO CONDUCT A PENETRATION TEST

Conducting a successful penetration test is a challenge for even the most experienced penetration tester. A penetration test requires perseverance and creativity, as well as a bit of luck. Luck must be earned, however; as Samuel Goldwyn once said, “I make my own luck and the harder I work, the luckier I get.10” The pen tester is always best following a clear and structured methodology that will ensure that all possible avenues of attack are explored and no potential vulnerability is overlooked.

Most pen testers use Linux®-based operating systems for their work. A further explanation of Linux, and some if its features can be found in Appendix 1: Linux, at the end of this book. A person that is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required