Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
What You’re Not to Read
Where to Go from Here
Part 1: Getting Started with Pen Testing
Chapter 1: Understanding the Role Pen Testers Play in Security
Looking at Pen Testing Roles
Getting Certified
Gaining the Basic Skills to Pen Test
Introducing Cybercrime
What You Need to Get Started
Deciding How and When to Pen Test
Taking Your First Steps
Chapter 2: An Overview Look at Pen Testing
The Goals of Pen Testing
Scanning Maintenance
Hacker Agenda
Doing Active Reconnaissance: How Hackers Gather Intelligence
Chapter 3: Gathering Your Tools
Considerations for Your Toolkit
Nessus
Wireshark
Kali Linux
Nmap
Part 2: Understanding the Different Types of Pen Testing
Chapter 4: Penetrate and Exploit
Understanding Vectors and the Art of Hacking
Examining Types of Penetration Attacks
Cryptology and Encryption
Using Metasploit Framework and Pro
Chapter 5: Assumption (Man in the Middle)
Toolkit Fundamentals
Listening In to Collect Data
Chapter 6: Overwhelm and Disrupt (DoS/DDoS)
Toolkit Fundamentals
Understanding Denial of Service (DoS) Attacks
Buffer Overflow Attacks
Fragmentation Attacks
Smurf Attacks
Tiny Packet Attacks
Xmas Tree Attacks
Chapter 7: Destroy (Malware)
Toolkit Fundamentals
Malware
Ransomware
Other Types of Destroy Attacks
Chapter 8: Subvert (Controls Bypass)
Toolkit Fundamentals
Attack Vectors
Phishing
Spoofing
Malware
Part 3: Diving In: Preparations and Testing
Chapter 9: Preparing for the Pen Test
Handling the Preliminary Logistics
Gathering Requirements
Coming Up with a Plan
Having a Backout Plan
Chapter 10: Conducting a Penetration Test
Attack!
Looking at the Pen Test from Inside
Documenting Your Every Move
Other Capture Methods and Vectors
Assessment
Prevention
Part 4: Creating a Pen Test Report
Chapter 11: Reporting
Structuring the Pen Test Report
Creating a Professional and Accurate Report
Delivering the Report: Report Out Fundamentals
Updating the Risk Register
Chapter 12: Making Recommendations
Understanding Why Recommendations Are Necessary
Seeing How Assessments Fit into Recommendations
Networks
Systems
General Security Recommendations: All Systems
More Recommendations
Chapter 13: Retesting
Looking at the Benefits of Retesting
Understanding the Reiterative Nature of Pen Testing and Retesting
Determining When to Retest
Choosing What to Retest
Running a Pen Retest
Part 5: The Part of Tens
Chapter 14: Top Ten Myths About Pen Testing
All Forms of Ethical Hacking Are the Same
We Can’t Afford a Pen Tester
We Can’t Trust a Pen Tester
We Don’t Trust the Tools
Pen Tests Are Not Done Often
Pen Tests Are Only for Technical Systems
Contractors Can’t Make Great Pen Testers
Pen Test Tool Kits Must Be Standardized
Pen Testing Itself Is a Myth and Unneeded
Pen Testers Know Enough and Don’t Need to Continue to Learn
Chapter 15: Ten Tips to Refine Your Pen Testing Skills
Continue Your Education
Build Your Toolkit
Think outside the Box
Think Like a Hacker
Get Involved
Use a Lab
Stay Informed
Stay Ahead of New Technologies
Build Your Reputation
Learn about Physical Security
Chapter 16: Ten Sites to Learn More About Pen Testing
SANS Institute
GIAC Certifications
Software Engineering Institute
(Assorted) Legal Penetration Sites
Open Web Application Security Project
Tenable
Nmap
Wireshark
Dark Reading
Offensive Security
Index
About the Author
Advertisement Page
Connect with Dummies
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →