Kali Linux 2 assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition

Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...

Full description

Bibliographic Details
Main Authors: Johansen, Gerard, Heriyanto, Tedi (Author), Allen, Lee (Author), Ali, Shakeel (Author)
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing 2016
Edition:Third edition
Series:Community experience distilled
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester
Item Description:Includes index
Physical Description:1 volume illustrations
ISBN:1785886061
9781785886065
1785888420