Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Introduction
About This Book Foolish Assumptions Icons Used in This Book What You’re Not to Read Where to Go from Here
Part 1: Getting Started with Pen Testing
Chapter 1: Understanding the Role Pen Testers Play in Security
Looking at Pen Testing Roles Getting Certified Gaining the Basic Skills to Pen Test Introducing Cybercrime What You Need to Get Started Deciding How and When to Pen Test Taking Your First Steps
Chapter 2: An Overview Look at Pen Testing
The Goals of Pen Testing Scanning Maintenance Hacker Agenda Doing Active Reconnaissance: How Hackers Gather Intelligence
Chapter 3: Gathering Your Tools
Considerations for Your Toolkit Nessus Wireshark Kali Linux Nmap
Part 2: Understanding the Different Types of Pen Testing
Chapter 4: Penetrate and Exploit
Understanding Vectors and the Art of Hacking Examining Types of Penetration Attacks Cryptology and Encryption Using Metasploit Framework and Pro
Chapter 5: Assumption (Man in the Middle)
Toolkit Fundamentals Listening In to Collect Data
Chapter 6: Overwhelm and Disrupt (DoS/DDoS)
Toolkit Fundamentals Understanding Denial of Service (DoS) Attacks Buffer Overflow Attacks Fragmentation Attacks Smurf Attacks Tiny Packet Attacks Xmas Tree Attacks
Chapter 7: Destroy (Malware)
Toolkit Fundamentals Malware Ransomware Other Types of Destroy Attacks
Chapter 8: Subvert (Controls Bypass)
Toolkit Fundamentals Attack Vectors Phishing Spoofing Malware
Part 3: Diving In: Preparations and Testing
Chapter 9: Preparing for the Pen Test
Handling the Preliminary Logistics Gathering Requirements Coming Up with a Plan Having a Backout Plan
Chapter 10: Conducting a Penetration Test
Attack! Looking at the Pen Test from Inside Documenting Your Every Move Other Capture Methods and Vectors Assessment Prevention
Part 4: Creating a Pen Test Report
Chapter 11: Reporting
Structuring the Pen Test Report Creating a Professional and Accurate Report Delivering the Report: Report Out Fundamentals Updating the Risk Register
Chapter 12: Making Recommendations
Understanding Why Recommendations Are Necessary Seeing How Assessments Fit into Recommendations Networks Systems General Security Recommendations: All Systems More Recommendations
Chapter 13: Retesting
Looking at the Benefits of Retesting Understanding the Reiterative Nature of Pen Testing and Retesting Determining When to Retest Choosing What to Retest Running a Pen Retest
Part 5: The Part of Tens
Chapter 14: Top Ten Myths About Pen Testing
All Forms of Ethical Hacking Are the Same We Can’t Afford a Pen Tester We Can’t Trust a Pen Tester We Don’t Trust the Tools Pen Tests Are Not Done Often Pen Tests Are Only for Technical Systems Contractors Can’t Make Great Pen Testers Pen Test Tool Kits Must Be Standardized Pen Testing Itself Is a Myth and Unneeded Pen Testers Know Enough and Don’t Need to Continue to Learn
Chapter 15: Ten Tips to Refine Your Pen Testing Skills
Continue Your Education Build Your Toolkit Think outside the Box Think Like a Hacker Get Involved Use a Lab Stay Informed Stay Ahead of New Technologies Build Your Reputation Learn about Physical Security
Chapter 16: Ten Sites to Learn More About Pen Testing
SANS Institute GIAC Certifications Software Engineering Institute (Assorted) Legal Penetration Sites Open Web Application Security Project Tenable Nmap Wireshark Dark Reading Offensive Security
Index About the Author Advertisement Page Connect with Dummies End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion