Cargando…

Penetration Testing for Dummies

Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shimonski, Robert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2020.
Colección:--For dummies.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 KNOVEL_on1148863475
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |n|---|||||
008 200404s2020 nju o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d TEFOD  |d UKAHL  |d N$T  |d OCLCF  |d RECBK  |d YDX  |d UAB  |d OCLCO  |d K6U  |d IEEEE  |d UPM  |d OCLCQ  |d OCLCO 
019 |a 1148121685  |a 1150884498  |a 1179918674  |a 1224349487  |a 1322785790 
020 |a 9781119577478 
020 |a 1119577470 
020 |a 9781119577461  |q (electronic bk.) 
020 |a 1119577462  |q (electronic bk.) 
020 |a 9781394178995  |q (electronic bk.) 
020 |a 1394178999  |q (electronic bk.) 
020 |z 1119577489 
020 |z 9781119577485 
024 7 |a 10.1002/9781394178995  |2 doi 
029 1 |a AU@  |b 000067582715 
029 1 |a AU@  |b 000068601737 
035 |a (OCoLC)1148863475  |z (OCoLC)1148121685  |z (OCoLC)1150884498  |z (OCoLC)1179918674  |z (OCoLC)1224349487  |z (OCoLC)1322785790 
037 |a CB4FEF47-B776-4BBD-8F7C-AFD9CF34F6EC  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9953204  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Shimonski, Robert. 
245 1 0 |a Penetration Testing for Dummies 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2020. 
300 |a 1 online resource (259 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a For dummies 
588 0 |a Print version record. 
505 0 |a Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- What You're Not to Read -- Where to Go from Here -- Part 1 Getting Started with Pen Testing -- Chapter 1 Understanding the Role Pen Testers Play in Security -- Looking at Pen Testing Roles -- Crowdsourced pen testers -- In-house security pro -- Security consultant -- Getting Certified -- Gaining the Basic Skills to Pen Test -- Basic networking -- General security technology -- Systems infrastructure and applications -- Mobile and cloud 
505 8 |a Introducing Cybercrime -- What You Need to Get Started -- Deciding How and When to Pen Test -- Taking Your First Steps -- Chapter 2 An Overview Look at Pen Testing -- The Goals of Pen Testing -- Protecting assets -- Identifying risk -- Finding vulnerabilities -- Scanning and assessing -- Securing operations -- Responding to incidents -- Scanning Maintenance -- Exclusions and ping sweeps -- Patching -- Antivirus and other technologies -- Compliance -- Hacker Agenda -- Hackivist -- Script kiddie to elite -- White hat -- Grey hat -- Black hat 
505 8 |a Doing Active Reconnaissance: How Hackers Gather Intelligence -- Chapter 3 Gathering Your Tools -- Considerations for Your Toolkit -- Nessus -- Wireshark -- Kali Linux -- Nmap -- Part 2 Understanding the Different Types of Pen Testing -- Chapter 4 Penetrate and Exploit -- Understanding Vectors and the Art of Hacking -- Examining Types of Penetration Attacks -- Social engineering -- Client-side and server-side attacks -- Password cracking -- Cryptology and Encryption -- SSL/TLS -- SSH -- IPsec -- Using Metasploit Framework and Pro -- Chapter 5 Assumption (Man in the Middle) -- Toolkit Fundamentals 
505 8 |a Burp Suite -- Wireshark -- Listening In to Collect Data -- Address spoofing -- Eavesdropping -- Packet capture and analysis -- Key loggers -- Card skimmers -- USB drives -- Chapter 6 Overwhelm and Disrupt (DoS/DDoS) -- Toolkit Fundamentals -- Kali -- Kali T50 Mixed Packet Injector tool -- Understanding Denial of Service (DoS) Attacks -- Buffer Overflow Attacks -- Fragmentation Attacks -- Smurf Attacks -- Tiny Packet Attacks -- Xmas Tree Attacks -- Chapter 7 Destroy (Malware) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nessus -- Malware -- Ransomware 
505 8 |a Other Types of Destroy Attacks -- Chapter 8 Subvert (Controls Bypass) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nmap -- Attack Vectors -- Phishing -- Spoofing -- Malware -- Using malware to find a way in -- Bypassing AV software -- Part 3 Diving In: Preparations and Testing -- Chapter 9 Preparing for the Pen Test -- Handling the Preliminary Logistics -- Holding an initial meeting -- Gaining permission -- Following change control -- Keeping backups -- Having documentation -- Gathering Requirements -- Reviewing past test results -- Consulting the risk register 
500 |a Coming Up with a Plan 
520 |a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer security. 
650 0 |a Testing  |x Data processing. 
650 0 |a Securities  |x Data processing. 
650 0 |a Hacking. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Valeurs mobilières  |x Informatique. 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS / Security / Network Security.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Securities  |x Data processing  |2 fast 
650 7 |a Testing  |x Data processing  |2 fast 
776 0 8 |i Print version:  |a Shimonski, Robert.  |t Penetration Testing for Dummies.  |d Newark : John Wiley & Sons, Incorporated, ©2020  |z 9781119577485 
830 0 |a --For dummies. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpPTD00001/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36407467 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00831053 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6147818 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36407468 
938 |a EBSCOhost  |b EBSC  |n 2417436 
938 |a YBP Library Services  |b YANK  |n 16712570 
994 |a 92  |b IZTAP