Kali Linux 2 assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition
Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...
Main Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Birmingham, UK
Packt Publishing
2016
|
Edition: | Third edition |
Series: | Community experience distilled
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Summary: | Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester |
---|---|
Item Description: | Includes index |
Physical Description: | 1 volume illustrations |
ISBN: | 1785886061 9781785886065 1785888420 |