Table of Contents:
  • Includes bibliographical references and index
  • What is penetration testing?
  • Reconnaissance
  • Scanning
  • Exploitation
  • Web-based exploitation
  • Maintaining access with backdoors and rootkits
  • Wrapping up the penetration test