Details

Penetration Testing Basics


Penetration Testing Basics

A Quick-Start Guide to Breaking into Systems

von: Ric Messier

46,99 €

Verlag: Apress
Format: PDF
Veröffentl.: 22.07.2016
ISBN/EAN: 9781484218570
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<div><div>Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading <em>Penetration Testing Basics</em>, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.&nbsp;</div><br></div><div><b>What You Will Learn</b></div><div><ul><li>Identify security vulnerabilities</li><li>Use some of the top security tools to identify holes</li><li>Read reports from testing tools</li><li>Spot and negate common attacks</li><li>Identify common Web-based attacks and exposures as well as recommendations for closing those holes</li></ul></div><div><b>Who This Book Is For</b></div><div><br></div><div><div>Anyone who has some familiarity with computers and an interest in information security and penetration testing.&nbsp;</div></div><div><br></div><div><br></div>
<div>1. What Is Penetration Testing?</div><div>&nbsp; &nbsp;Information Security<br></div><div>&nbsp; &nbsp;Penetration Testing vs Security Assessments<br></div><div>&nbsp; &nbsp;Who does Penetration Testing<br></div><div><br></div><div>2. Digging for Information</div><div>&nbsp; &nbsp;Google Hacking<br></div><div>&nbsp; &nbsp;Social Networking<br></div><div>&nbsp; &nbsp;Job Sites<br></div><div>&nbsp; &nbsp;Technical sources (e.g., regional Internet registries)<br></div><div><br></div><div>3. What’s Open?</div><div>&nbsp; &nbsp;Port scanning<br></div><div>&nbsp; &nbsp;Banner grabbing<br></div><div><br></div><div>4. Vulnerabilities</div><div>&nbsp; &nbsp;Scanning for vulnerabilities<br></div><div>&nbsp; &nbsp;Nessus vs Nexpose vs OpenVAS<br><div>&nbsp; &nbsp;Fuzzing<br></div><div><br></div><div>5. Exploitation</div><div>&nbsp; &nbsp;Using Metasploit<br></div><div>&nbsp; &nbsp;Exploit Database<br></div><div><br></div><div>6. Breaking Web Sites</div><div>&nbsp; &nbsp;Common Vulnerabilities&lt;</div><div>&nbsp; &nbsp;Web Scanning<br></div><div><br></div><div>7. Reporting</div></div>
<div>Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College.</div><div><br></div><div>Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies.</div><div><br></div><div>An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security.&nbsp;</div><div>&nbsp;</div>
<div>Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.<br><br></div><div>Penetration Testing Basics explains:</div><div><br></div><p></p>

<p></p><ul><li>How to identify security vulnerabilities<br></li><li>How to use some of the top security tools in order to identify holes<br></li><li>How to read reports from testing tools<br></li><li>Common vulnerability types and attacks<br></li><li>Common Web-based attacks and exposures as well as recommendations for closing those holes<br></li></ul><p></p>

<p></p>

<p></p>

<p></p>

<p></p>
<p>Short and to the point practical hands-on type of book</p><p>Quick starting point to get someone right into penetration testing</p><p>Quick, guided tours of important security tools</p><p>Focus on remediation strategies and not just breaking things</p>
<div>While there are other books on this topic, this particular book will be focused and direct, which will allow someone interested in this topic to get started immediately. While there is a focus on foundations, the objective of the book will be to get people immediately working on performing penetration testing. All of the foundational components will be explained in place with a focus on hands-on, practical experience rather than using the practical experience as an afterthought.&nbsp;<br></div><div><br></div>

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €