Amazon cover image
Image from Amazon.com

Professional penetration testing / Thomas Wilhelm, Matthew Neely, technical editor.

By: Material type: TextTextPublisher: Amsterdam : Syngress, an imprint of Elsevier, [2013Edition: Second editionDescription: xvii, 445 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781597499934
Subject(s): DDC classification:
  • 005.8 WI.P 2013 23
LOC classification:
  • TK5105.59 .W544 2013
Online resources:
Contents:
Chapter 1. Introduction -- chapter 2. Ethics and hacking -- chapter 3. Setting up your lab -- chapter 4. Methodologies and frameworks -- chapter 5. Pentest project management -- chapter 6. Information gathering -- chapter 7. Vulnerability identification -- chapter 8. Vulnerability exploitation -- chapter 9. Local system attacks -- chapter 10. Privilege escalation -- chapter 11. Targeting support systems -- chapter 12. Targeting the network -- chapter 13. Web application attack techniques -- chapter 14. Reporting results -- chapter 15. Hacking as a career.
Summary: This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices.
List(s) this item appears in: test002
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 005.8 WI.P 2013 (Browse shelf(Opens below)) Not For Loan 211321
Books Books The Knowledge Hub Library Computing 005.8 WI.P 2013 (Browse shelf(Opens below)) Not For Loan 211322
Books Books The Knowledge Hub Library Computing 005.8 WI.P 2013 (Browse shelf(Opens below)) Not For Loan 211323
Books Books The Knowledge Hub Library Computing 005.8 WI.P 2013 (Browse shelf(Opens below)) Not For Loan 211324
Books Books The Knowledge Hub Library Computing 005.8 WI.P 2013 (Browse shelf(Opens below)) Not For Loan 211325

Includes bibliographical references (pages 433-434) and index.

Chapter 1. Introduction -- chapter 2. Ethics and hacking -- chapter 3. Setting up your lab -- chapter 4. Methodologies and frameworks -- chapter 5. Pentest project management -- chapter 6. Information gathering -- chapter 7. Vulnerability identification -- chapter 8. Vulnerability exploitation -- chapter 9. Local system attacks -- chapter 10. Privilege escalation -- chapter 11. Targeting support systems -- chapter 12. Targeting the network -- chapter 13. Web application attack techniques -- chapter 14. Reporting results -- chapter 15. Hacking as a career.

This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices.

There are no comments on this title.

to post a comment.