Professional Penetration Testing, 2nd Edition Front Cover

Professional Penetration Testing, 2nd Edition

  • Length: 464 pages
  • Edition: 2
  • Publisher:
  • Publication Date: 2013-07-31
  • ISBN-10: 1597499935
  • ISBN-13: 9781597499934
  • Sales Rank: #1181245 (See Top 100 Books)
Description

Professional Penetration Testing, Second Edition: Creating and Learning in a Hacking Lab walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

  • Find out how to turn hacking and pen testing skills into a professional career
  • Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
  • Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
  • Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Table of Contents

Chapter 1: Introduction
Chapter 2: Ethics and Hacking
Chapter 3: Setting up Your Lab
Chapter 4: Methodologies and Frameworks
Chapter 5: Pentest Project Management
Chapter 6: Information Gathering
Chapter 7: Vulnerability Identification
Chapter 8: Vulnerability Exploitation
Chapter 9: Local System Attacks
Chapter 10: Privilege Escalation
Chapter 11: Targeting Support Systems
Chapter 12: Targeting the Network
Chapter 13: Web Application Attack Techniques
Chapter 14: Reporting Results
Chapter 15: Hacking as a Career

To access the link, solve the captcha.