- 464 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About This Book
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingâthe act of testing a computer network to find security vulnerabilities before they are maliciously exploitedâis a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.
All disc-based content for this title is now available on the Web.
- Find out how to turn hacking and pen testing skills into a professional career
- Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
- Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
- Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
Frequently asked questions
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright page
- Preface
- About the Author
- About the Technical Editor
- Acknowledgments
- Chapter 1: Introduction
- Chapter 2: Ethics and Hacking
- Chapter 3: Setting up Your Lab
- Chapter 4: Methodologies and Frameworks
- Chapter 5: Pentest Project Management
- Chapter 6: Information Gathering
- Chapter 7: Vulnerability Identification
- Chapter 8: Vulnerability Exploitation
- Chapter 9: Local System Attacks
- Chapter 10: Privilege Escalation
- Chapter 11: Targeting Support Systems
- Chapter 12: Targeting the Network
- Chapter 13: Web Application Attack Techniques
- Chapter 14: Reporting Results
- Chapter 15: Hacking as a Career
- Index