Book description
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability identification, vulnerability exploitation, privilege escalation, and test-data archival methods. It also discusses how to maintain access and cover one's tracks. It includes two video courses to teach readers fundamental and intermediate information-system penetration testing techniques, and to explain how to create and operate a formal hacking lab.The book is divided into three parts. Part 1 focuses on the professionals who are members of a penetration test team, the skills required to be an effective team member, and the ways to create a PenTest lab. Part 2 looks at the activities involved in a penetration test and how to run a PenTest to improve the overall security posture of the client. Part 3 discusses the creation of a final report for the client, cleaning up the lab for the next penetration test, and identifying the training needs of penetration-test team members. This book will benefit both experienced and novice penetration test practitioners.
- Find out how to turn hacking and pen testing skills into a professional career
- Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
- Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
- Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
Table of contents
- Cover Image
- Table of Contents
- Copyright
- About the Author
- Acknowledgments
- Foreword
- Setting Up
- CHAPTER 1. Introduction
- CHAPTER 2. Ethics and Hacking
- CHAPTER 3. Hacking as a Career
- CHAPTER 4. Setting Up Your Lab
- CHAPTER 5. Creating and Using PenTest Targets in Your Lab
- CHAPTER 6. Methodologies
- CHAPTER 7. PenTest Metrics
- CHAPTER 8. Management of a PenTest
- Running a PenTest
- CHAPTER 9. Information Gathering
- CHAPTER 10. Vulnerability Identification
- CHAPTER 11. Vulnerability Verification
- CHAPTER 12. Compromising a System and Privilege Escalation
- CHAPTER 13. Maintaining Access
- CHAPTER 14. Covering Your Tracks
- Wrapping Everything Up
- CHAPTER 15. Reporting Results
- CHAPTER 16. Archiving Data
- CHAPTER 17. Cleaning Up Your Lab
- CHAPTER 18. Planning for Your Next PenTest
- Appendix A. Acronyms
- Appendix B. Definitions
- Index
Product information
- Title: Professional Penetration Testing
- Author(s):
- Release date: August 2015
- Publisher(s): Syngress
- ISBN: 9780080960944
You might also like
book
Professional Penetration Testing, 2nd Edition
Professional Penetration Testing walks you through the entire process of setting up and running a pen …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
book
Penetration Testing
This essential guide for business and IT managers, developed in collaboration with CREST, explains the process …
book
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for …