Home Page Icon
Home Page
Table of Contents for
Advertisement Page
Close
Advertisement Page
by Robert Shimonski
Penetration Testing For Dummies
Cover
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
What You’re Not to Read
Where to Go from Here
Part 1: Getting Started with Pen Testing
Chapter 1: Understanding the Role Pen Testers Play in Security
Looking at Pen Testing Roles
Getting Certified
Gaining the Basic Skills to Pen Test
Introducing Cybercrime
What You Need to Get Started
Deciding How and When to Pen Test
Taking Your First Steps
Chapter 2: An Overview Look at Pen Testing
The Goals of Pen Testing
Scanning Maintenance
Hacker Agenda
Doing Active Reconnaissance: How Hackers Gather Intelligence
Chapter 3: Gathering Your Tools
Considerations for Your Toolkit
Nessus
Wireshark
Kali Linux
Nmap
Part 2: Understanding the Different Types of Pen Testing
Chapter 4: Penetrate and Exploit
Understanding Vectors and the Art of Hacking
Examining Types of Penetration Attacks
Cryptology and Encryption
Using Metasploit Framework and Pro
Chapter 5: Assumption (Man in the Middle)
Toolkit Fundamentals
Listening In to Collect Data
Chapter 6: Overwhelm and Disrupt (DoS/DDoS)
Toolkit Fundamentals
Understanding Denial of Service (DoS) Attacks
Buffer Overflow Attacks
Fragmentation Attacks
Smurf Attacks
Tiny Packet Attacks
Xmas Tree Attacks
Chapter 7: Destroy (Malware)
Toolkit Fundamentals
Malware
Ransomware
Other Types of Destroy Attacks
Chapter 8: Subvert (Controls Bypass)
Toolkit Fundamentals
Attack Vectors
Phishing
Spoofing
Malware
Part 3: Diving In: Preparations and Testing
Chapter 9: Preparing for the Pen Test
Handling the Preliminary Logistics
Gathering Requirements
Coming Up with a Plan
Having a Backout Plan
Chapter 10: Conducting a Penetration Test
Attack!
Looking at the Pen Test from Inside
Documenting Your Every Move
Other Capture Methods and Vectors
Assessment
Prevention
Part 4: Creating a Pen Test Report
Chapter 11: Reporting
Structuring the Pen Test Report
Creating a Professional and Accurate Report
Delivering the Report: Report Out Fundamentals
Updating the Risk Register
Chapter 12: Making Recommendations
Understanding Why Recommendations Are Necessary
Seeing How Assessments Fit into Recommendations
Networks
Systems
General Security Recommendations: All Systems
More Recommendations
Chapter 13: Retesting
Looking at the Benefits of Retesting
Understanding the Reiterative Nature of Pen Testing and Retesting
Determining When to Retest
Choosing What to Retest
Running a Pen Retest
Part 5: The Part of Tens
Chapter 14: Top Ten Myths About Pen Testing
All Forms of Ethical Hacking Are the Same
We Can’t Afford a Pen Tester
We Can’t Trust a Pen Tester
We Don’t Trust the Tools
Pen Tests Are Not Done Often
Pen Tests Are Only for Technical Systems
Contractors Can’t Make Great Pen Testers
Pen Test Tool Kits Must Be Standardized
Pen Testing Itself Is a Myth and Unneeded
Pen Testers Know Enough and Don’t Need to Continue to Learn
Chapter 15: Ten Tips to Refine Your Pen Testing Skills
Continue Your Education
Build Your Toolkit
Think outside the Box
Think Like a Hacker
Get Involved
Use a Lab
Stay Informed
Stay Ahead of New Technologies
Build Your Reputation
Learn about Physical Security
Chapter 16: Ten Sites to Learn More About Pen Testing
SANS Institute
GIAC Certifications
Software Engineering Institute
(Assorted) Legal Penetration Sites
Open Web Application Security Project
Tenable
Nmap
Wireshark
Dark Reading
Offensive Security
Index
About the Author
Advertisement Page
Connect with Dummies
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About the Author
Next
Next Chapter
Connect with Dummies
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset