Penetration testing essentials

IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --

Bibliographic Details
Main Author: Oriyano, Sean-Philip
Format: eBook
Language:English
Published: Hoboken, NJ Sybex 2017
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06465nmm a2200601 u 4500
001 EB001997467
003 EBX01000000000000001160368
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210823 ||| eng
020 |a 9781119323983 
020 |a 9781119419358 
020 |a 1119323983 
020 |a 1119235332 
020 |a 9781119235330 
050 4 |a QA76.9.A25 
100 1 |a Oriyano, Sean-Philip 
245 0 0 |a Penetration testing essentials 
260 |a Hoboken, NJ  |b Sybex  |c 2017 
300 |a 1 online resource 
505 0 |a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence 
505 0 |a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack 
505 0 |a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software 
505 0 |a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software 
505 0 |a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening 
653 |a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Pirates informatiques 
653 |a Hacking / fast 
653 |a Piratage informatique 
653 |a Penetration testing (Computer security) / fast 
653 |a Computer crimes / Prevention / fast 
653 |a Hackers / fast 
653 |a Sécurité informatique 
653 |a Computer Security 
653 |a Computer security / fast 
653 |a Computer security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force 
015 |a GBB702339 
776 |z 9781119419358 
776 |z 9781119235309 
776 |z 9781119235330 
776 |z 1119235332 
776 |z 1119323983 
776 |z 9781119323983 
776 |z 1119235308 
776 |z 1119419352 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119235309/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
082 0 |a 364.1 
520 |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --