Penetration Testing for Dummies

Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking...

Full description

Saved in:
Bibliographic Details
Main Author Shimonski, Robert
Format Electronic eBook
LanguageEnglish
Published Newark : John Wiley & Sons, Incorporated, 2020.
Series--For dummies.
Subjects
Online AccessFull text
ISBN9781119577478
1119577470
9781119577461
1119577462
9781394178995
1394178999
1119577489
9781119577485
Physical Description1 online resource (259 pages)

Cover

LEADER 00000cam a2200000Mu 4500
001 kn-on1148863475
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 200404s2020 nju o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d TEFOD  |d UKAHL  |d N$T  |d OCLCF  |d RECBK  |d YDX  |d UAB  |d OCLCO  |d K6U  |d IEEEE  |d UPM  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781119577478 
020 |a 1119577470 
020 |a 9781119577461  |q (electronic bk.) 
020 |a 1119577462  |q (electronic bk.) 
020 |a 9781394178995  |q (electronic bk.) 
020 |a 1394178999  |q (electronic bk.) 
020 |z 1119577489 
020 |z 9781119577485 
024 7 |a 10.1002/9781394178995  |2 doi 
035 |a (OCoLC)1148863475  |z (OCoLC)1148121685  |z (OCoLC)1150884498  |z (OCoLC)1179918674  |z (OCoLC)1224349487  |z (OCoLC)1322785790 
100 1 |a Shimonski, Robert. 
245 1 0 |a Penetration Testing for Dummies 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2020. 
300 |a 1 online resource (259 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a For dummies 
505 0 |a Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- What You're Not to Read -- Where to Go from Here -- Part 1 Getting Started with Pen Testing -- Chapter 1 Understanding the Role Pen Testers Play in Security -- Looking at Pen Testing Roles -- Crowdsourced pen testers -- In-house security pro -- Security consultant -- Getting Certified -- Gaining the Basic Skills to Pen Test -- Basic networking -- General security technology -- Systems infrastructure and applications -- Mobile and cloud 
505 8 |a Introducing Cybercrime -- What You Need to Get Started -- Deciding How and When to Pen Test -- Taking Your First Steps -- Chapter 2 An Overview Look at Pen Testing -- The Goals of Pen Testing -- Protecting assets -- Identifying risk -- Finding vulnerabilities -- Scanning and assessing -- Securing operations -- Responding to incidents -- Scanning Maintenance -- Exclusions and ping sweeps -- Patching -- Antivirus and other technologies -- Compliance -- Hacker Agenda -- Hackivist -- Script kiddie to elite -- White hat -- Grey hat -- Black hat 
505 8 |a Doing Active Reconnaissance: How Hackers Gather Intelligence -- Chapter 3 Gathering Your Tools -- Considerations for Your Toolkit -- Nessus -- Wireshark -- Kali Linux -- Nmap -- Part 2 Understanding the Different Types of Pen Testing -- Chapter 4 Penetrate and Exploit -- Understanding Vectors and the Art of Hacking -- Examining Types of Penetration Attacks -- Social engineering -- Client-side and server-side attacks -- Password cracking -- Cryptology and Encryption -- SSL/TLS -- SSH -- IPsec -- Using Metasploit Framework and Pro -- Chapter 5 Assumption (Man in the Middle) -- Toolkit Fundamentals 
505 8 |a Burp Suite -- Wireshark -- Listening In to Collect Data -- Address spoofing -- Eavesdropping -- Packet capture and analysis -- Key loggers -- Card skimmers -- USB drives -- Chapter 6 Overwhelm and Disrupt (DoS/DDoS) -- Toolkit Fundamentals -- Kali -- Kali T50 Mixed Packet Injector tool -- Understanding Denial of Service (DoS) Attacks -- Buffer Overflow Attacks -- Fragmentation Attacks -- Smurf Attacks -- Tiny Packet Attacks -- Xmas Tree Attacks -- Chapter 7 Destroy (Malware) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nessus -- Malware -- Ransomware 
505 8 |a Other Types of Destroy Attacks -- Chapter 8 Subvert (Controls Bypass) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nmap -- Attack Vectors -- Phishing -- Spoofing -- Malware -- Using malware to find a way in -- Bypassing AV software -- Part 3 Diving In: Preparations and Testing -- Chapter 9 Preparing for the Pen Test -- Handling the Preliminary Logistics -- Holding an initial meeting -- Gaining permission -- Following change control -- Keeping backups -- Having documentation -- Gathering Requirements -- Reviewing past test results -- Consulting the risk register 
500 |a Coming Up with a Plan 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer security. 
650 0 |a Testing  |x Data processing. 
650 0 |a Securities  |x Data processing. 
650 0 |a Hacking. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
776 0 8 |i Print version:  |a Shimonski, Robert.  |t Penetration Testing for Dummies.  |d Newark : John Wiley & Sons, Incorporated, ©2020  |z 9781119577485 
830 0 |a --For dummies. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPTD00001/penetration-testing-for?kpromoter=marc  |y Full text