Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Copyright Preface About The Author Acknowledgements Contents Introduction Chapter 1: Introduction to Penetration Testing
Case study Security basics Risk management The threat environment Overview of the steps to penetration testing Penetration testing versus hacking Benefits of penetration testing Summary Key learning points Questions
Chapter 2: Preparing to Conduct a Penetration Test
Approval and scope Planning Summary Questions
Chapter 3: Reconnaissance
The start of the test Physical information gathering Other data sources Avoiding footprinting Key learning points Questions
Chapter 4: Active Reconnaissance and Enumeration
Port scanning Countermeasures to active reconnaissance Key learning points Questions
Chapter 5: Vulnerability Assessments
The attack vectors References and sources of vulnerabilities Using vulnerability assessment tools PCI DSS requirements Malicious code Reporting on the vulnerability assessment Key learning points Questions
Chapter 6: Hacking Windows® and UNIX
Having fun Common hacking initiatives Defeating data theft Protecting against unauthorized access Access controls Actions of the attacker Focus on UNIX/Linux Advanced attacks Source code review Case study: Attack on a Chinese bank Key learning points Questions
Chapter 7: Launching the Attack
Steps to an exploit Attacking wireless networks Pen testing wireless Network sniffing Firewalls Intrusion detection and prevention systems (IDS/IPS) Key learning points Questions
Chapter 8: Attacking Web Applications
The steps in attacking a web application Questions
Chapter 9: Preparing the Report
Determining risk levels Risk response Report confidentiality Delivering the report Key learning points Questions
Appendix 1: Linux Appendix 2: Encryption
Concepts of cryptography
Appendix 3: Regulations and Legislation
Examples of regulations and legislation Protection of intellectual property
Appendix 4: Incident Management
Concepts of incident management
Additional Questions and Answers
Answers
References ITG Resources
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion