Text
Professional penetration testing: creating and operating a formal hacking lab
Contents:
Pt. I Setting Up
Ch. 1 Introduction
Ch. 2 Ethics and Hacking
Ch. 3 Hacking as a Career
Ch. 4 Setting up Your Lab
Ch. 5 Creating and Using PenTest Targets in Your Lab
Ch. 6 Methodologies
Ch. 7 PenTest Metrics
Ch. 8 Management of a PenTest
Pt. II Running a PenTest
Ch. 9 Information Gathering
Ch. 10 Vulnerability Identification
Ch. 11 Vulnerability Verification
Ch. 12 Compromising a System and Privilege Escalation
Ch. 13 Maintaining Access
Ch. 14 Covering Your Tracks
Pt. III Wrapping Everything Up
Ch. 15 Reporting Results
Ch. 16 Archiving Data
Ch. 17 Cleaning Up Your Lab
Ch. 18 Planning for Your Next PenTest
Appendix A Acronyms. Pt. I Setting Up
Ch. 1 Introduction
Ch. 2 Ethics and Hacking
Ch. 3 Hacking as a Career
Ch. 4 Setting up Your Lab
Ch. 5 Creating and Using PenTest Targets in Your Lab
Ch. 6 Methodologies
Ch. 7 PenTest Metrics
Ch. 8 Management of a PenTest
Pt. II Running a PenTest
Ch. 9 Information Gathering
Ch. 10 Vulnerability Identification
Ch. 11 Vulnerability Verification
Ch. 12 Compromising a System and Privilege Escalation
Ch. 13 Maintaining Access
Ch. 14 Covering Your Tracks
Pt. III Wrapping Everything Up
Ch. 15 Reporting Results
Ch. 16 Archiving Data
Ch. 17 Cleaning Up Your Lab
Ch. 18 Planning for Your Next PenTest
Appendix A Acronyms.
No other version available