Penetration Testing for Dummies
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Newark :
John Wiley & Sons, Incorporated,
2020.
|
| Series | --For dummies.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781119577478 1119577470 9781119577461 1119577462 9781394178995 1394178999 1119577489 9781119577485 |
| Physical Description | 1 online resource (259 pages) |
Cover
| LEADER | 00000cam a2200000Mu 4500 | ||
|---|---|---|---|
| 001 | kn-on1148863475 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 200404s2020 nju o 000 0 eng d | ||
| 040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d TEFOD |d UKAHL |d N$T |d OCLCF |d RECBK |d YDX |d UAB |d OCLCO |d K6U |d IEEEE |d UPM |d OCLCQ |d OCLCO |d OCLCL | ||
| 020 | |a 9781119577478 | ||
| 020 | |a 1119577470 | ||
| 020 | |a 9781119577461 |q (electronic bk.) | ||
| 020 | |a 1119577462 |q (electronic bk.) | ||
| 020 | |a 9781394178995 |q (electronic bk.) | ||
| 020 | |a 1394178999 |q (electronic bk.) | ||
| 020 | |z 1119577489 | ||
| 020 | |z 9781119577485 | ||
| 024 | 7 | |a 10.1002/9781394178995 |2 doi | |
| 035 | |a (OCoLC)1148863475 |z (OCoLC)1148121685 |z (OCoLC)1150884498 |z (OCoLC)1179918674 |z (OCoLC)1224349487 |z (OCoLC)1322785790 | ||
| 100 | 1 | |a Shimonski, Robert. | |
| 245 | 1 | 0 | |a Penetration Testing for Dummies |
| 260 | |a Newark : |b John Wiley & Sons, Incorporated, |c 2020. | ||
| 300 | |a 1 online resource (259 pages) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a For dummies | |
| 505 | 0 | |a Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- What You're Not to Read -- Where to Go from Here -- Part 1 Getting Started with Pen Testing -- Chapter 1 Understanding the Role Pen Testers Play in Security -- Looking at Pen Testing Roles -- Crowdsourced pen testers -- In-house security pro -- Security consultant -- Getting Certified -- Gaining the Basic Skills to Pen Test -- Basic networking -- General security technology -- Systems infrastructure and applications -- Mobile and cloud | |
| 505 | 8 | |a Introducing Cybercrime -- What You Need to Get Started -- Deciding How and When to Pen Test -- Taking Your First Steps -- Chapter 2 An Overview Look at Pen Testing -- The Goals of Pen Testing -- Protecting assets -- Identifying risk -- Finding vulnerabilities -- Scanning and assessing -- Securing operations -- Responding to incidents -- Scanning Maintenance -- Exclusions and ping sweeps -- Patching -- Antivirus and other technologies -- Compliance -- Hacker Agenda -- Hackivist -- Script kiddie to elite -- White hat -- Grey hat -- Black hat | |
| 505 | 8 | |a Doing Active Reconnaissance: How Hackers Gather Intelligence -- Chapter 3 Gathering Your Tools -- Considerations for Your Toolkit -- Nessus -- Wireshark -- Kali Linux -- Nmap -- Part 2 Understanding the Different Types of Pen Testing -- Chapter 4 Penetrate and Exploit -- Understanding Vectors and the Art of Hacking -- Examining Types of Penetration Attacks -- Social engineering -- Client-side and server-side attacks -- Password cracking -- Cryptology and Encryption -- SSL/TLS -- SSH -- IPsec -- Using Metasploit Framework and Pro -- Chapter 5 Assumption (Man in the Middle) -- Toolkit Fundamentals | |
| 505 | 8 | |a Burp Suite -- Wireshark -- Listening In to Collect Data -- Address spoofing -- Eavesdropping -- Packet capture and analysis -- Key loggers -- Card skimmers -- USB drives -- Chapter 6 Overwhelm and Disrupt (DoS/DDoS) -- Toolkit Fundamentals -- Kali -- Kali T50 Mixed Packet Injector tool -- Understanding Denial of Service (DoS) Attacks -- Buffer Overflow Attacks -- Fragmentation Attacks -- Smurf Attacks -- Tiny Packet Attacks -- Xmas Tree Attacks -- Chapter 7 Destroy (Malware) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nessus -- Malware -- Ransomware | |
| 505 | 8 | |a Other Types of Destroy Attacks -- Chapter 8 Subvert (Controls Bypass) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nmap -- Attack Vectors -- Phishing -- Spoofing -- Malware -- Using malware to find a way in -- Bypassing AV software -- Part 3 Diving In: Preparations and Testing -- Chapter 9 Preparing for the Pen Test -- Handling the Preliminary Logistics -- Holding an initial meeting -- Gaining permission -- Following change control -- Keeping backups -- Having documentation -- Gathering Requirements -- Reviewing past test results -- Consulting the risk register | |
| 500 | |a Coming Up with a Plan | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Testing |x Data processing. | |
| 650 | 0 | |a Securities |x Data processing. | |
| 650 | 0 | |a Hacking. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 776 | 0 | 8 | |i Print version: |a Shimonski, Robert. |t Penetration Testing for Dummies. |d Newark : John Wiley & Sons, Incorporated, ©2020 |z 9781119577485 |
| 830 | 0 | |a --For dummies. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPTD00001/penetration-testing-for?kpromoter=marc |y Full text |