Description |
1 online resource (xvii, 445 pages) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Contents |
Chapter 1. Introduction -- chapter 2. Ethics and hacking -- chapter 3. Setting up your lab -- chapter 4. Methodologies and frameworks -- chapter 5. Pentest project management -- chapter 6. Information gathering -- chapter 7. Vulnerability identification -- chapter 8. Vulnerability exploitation -- chapter 9. Local system attacks -- chapter 10. Privilege escalation -- chapter 11. Targeting support systems -- chapter 12. Targeting the network -- chapter 13. Web application attack techniques -- chapter 14. Reporting results -- chapter 15. Hacking as a career. |
Summary |
This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices. |
Subject |
Computer networks -- Security measures.
|
|
Penetration testing (Computer security)
|
|
Computer networks -- Testing.
|
|
Hackers.
|
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Tests d'intrusion. |
|
Pirates informatiques. |
|
Hackers |
|
Computer networks -- Security measures |
|
Computer networks -- Testing |
|
Penetration testing (Computer security) |
Added Author |
Neely, Matthew. Editor.
|
Added Title |
Creating and learning in a hacking lab |
Other Form: |
Print version: Wilhelm, Thomas. Professional penetration testing. 2nd ed. Waltham, Mass. : Syngress, ©2013 9781597499934 |
ISBN |
9780124046184 |
|
0124046185 |
|
(print) |
|
(print) |
|