Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report.
The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting.
Cover
Title
Copyright
Preface
About The Author
Acknowledgements
Contents
Introduction
Chapter 1: Introduction to Penetration Testing
Case study
Security basics
Risk management
The threat environment
Overview of the steps to penetration testing
Penetration testing versus hacking
Benefits of penetration testing
Summary
Key learning points
Questions
Chapter 2: Preparing to Conduct a Penetration Test
Approval and scope
Planning
Summary
Questions
Chapter 3: Reconnaissance
The start of the test
Physical information gathering
Other data sources
Avoiding footprinting
Key learning points
Questions
Chapter 4: Active Reconnaissance and Enumeration
Port scanning
Countermeasures to active reconnaissance
Key learning points
Questions
Chapter 5: Vulnerability Assessments
The attack vectors
References and sources of vulnerabilities
Using vulnerability assessment tools
PCI DSS requirements
Malicious code
Reporting on the vulnerability assessment
Key learning points
Questions
Chapter 6: Hacking Windows® and UNIX
Having fun
Common hacking initiatives
Defeating data theft
Protecting against unauthorized access
Access controls
Actions of the attacker
Focus on UNIX/Linux
Advanced attacks
Source code review
Case study: Attack on a Chinese bank
Key learning points
Questions
Chapter 7: Launching the Attack
Steps to an exploit
Attacking wireless networks
Pen testing wireless
Network sniffing
Firewalls
Intrusion detection and prevention systems (IDS/IPS)
Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report.
The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting.
Table of contents
Cover
Title
Copyright
Preface
About The Author
Acknowledgements
Contents
Introduction
Chapter 1: Introduction to Penetration Testing
Case study
Security basics
Risk management
The threat environment
Overview of the steps to penetration testing
Penetration testing versus hacking
Benefits of penetration testing
Summary
Key learning points
Questions
Chapter 2: Preparing to Conduct a Penetration Test
Approval and scope
Planning
Summary
Questions
Chapter 3: Reconnaissance
The start of the test
Physical information gathering
Other data sources
Avoiding footprinting
Key learning points
Questions
Chapter 4: Active Reconnaissance and Enumeration
Port scanning
Countermeasures to active reconnaissance
Key learning points
Questions
Chapter 5: Vulnerability Assessments
The attack vectors
References and sources of vulnerabilities
Using vulnerability assessment tools
PCI DSS requirements
Malicious code
Reporting on the vulnerability assessment
Key learning points
Questions
Chapter 6: Hacking Windows® and UNIX
Having fun
Common hacking initiatives
Defeating data theft
Protecting against unauthorized access
Access controls
Actions of the attacker
Focus on UNIX/Linux
Advanced attacks
Source code review
Case study: Attack on a Chinese bank
Key learning points
Questions
Chapter 7: Launching the Attack
Steps to an exploit
Attacking wireless networks
Pen testing wireless
Network sniffing
Firewalls
Intrusion detection and prevention systems (IDS/IPS)