Professional Penetration Testing
eBook - ePub

Professional Penetration Testing

Creating and Learning in a Hacking Lab

  1. 464 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Professional Penetration Testing

Creating and Learning in a Hacking Lab

Book details
Table of contents
Citations

About This Book

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

  • Find out how to turn hacking and pen testing skills into a professional career
  • Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
  • Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
  • Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Professional Penetration Testing by Thomas Wilhelm in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Syngress
Year
2013
ISBN
9780124046184
Edition
2

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Preface
  6. About the Author
  7. About the Technical Editor
  8. Acknowledgments
  9. Chapter 1: Introduction
  10. Chapter 2: Ethics and Hacking
  11. Chapter 3: Setting up Your Lab
  12. Chapter 4: Methodologies and Frameworks
  13. Chapter 5: Pentest Project Management
  14. Chapter 6: Information Gathering
  15. Chapter 7: Vulnerability Identification
  16. Chapter 8: Vulnerability Exploitation
  17. Chapter 9: Local System Attacks
  18. Chapter 10: Privilege Escalation
  19. Chapter 11: Targeting Support Systems
  20. Chapter 12: Targeting the Network
  21. Chapter 13: Web Application Attack Techniques
  22. Chapter 14: Reporting Results
  23. Chapter 15: Hacking as a Career
  24. Index