Chapter 1: Introduction to Penetration Testing
Overview of the steps to penetration testing
Penetration testing versus hacking
Benefits of penetration testing
Chapter 2: Preparing to Conduct a Penetration Test
Physical information gathering
Chapter 4: Active Reconnaissance and Enumeration
Countermeasures to active reconnaissance
Chapter 5: Vulnerability Assessments
References and sources of vulnerabilities
Using vulnerability assessment tools
Reporting on the vulnerability assessment
Chapter 6: Hacking Windows® and UNIX
Protecting against unauthorized access
Case study: Attack on a Chinese bank
Chapter 7: Launching the Attack
Intrusion detection and prevention systems (IDS/IPS)
Chapter 8: Attacking Web Applications
The steps in attacking a web application
Chapter 9: Preparing the Report
Appendix 3: Regulations and Legislation
Examples of regulations and legislation
Protection of intellectual property
Appendix 4: Incident Management
Concepts of incident management
3.138.172.130