Professional Penetration Testing: Creating and Learning in a Hacking Lab
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Wilhelm, Thomas (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington Elsevier Science 2013
Schlagworte:
Online-Zugang:FAW01
FAW02
UBY01
Beschreibung:Telecommunications
Front Cover; Professional Penetration Testing: Creating and Learning in a Hacking Lab; Copyright; Contents; Preface; About the Author; About the Technical Editor; Acknowledgments; Family; HackingDojo.com; On the Side; Chapter 1: Introduction; Introduction; About This Edition; Getting Setup; Performing the Penetration Test; Internal Pentesting; Personal Skills; Download Links and Support Files; HackingDojo.com; Virtual Images; Hardware Configuration Files; Summary; Chapter 2: Ethics and Hacking; Getting Permission to Hack; Code of Ethics Canons [(ISC)2]; Why Stay Ethical?; Black Hat Hackers
White Hat HackersGray Hat Hackers; Ethical Standards; Certifications; Contractor; Employer; Educational and Institutional Organizations; Information Systems Security Association; Internet Activities Board; Institute of Electrical and Electronics Engineers; Organization for Economic Cooperation and Development; Computer Crime Laws; Types of Laws; Civil Law; Criminal Law; Administrative/Regulatory Law; Type of Computer Crimes and Attacks; U.S. Federal Laws; U.S. State Laws; International Laws; Canada; United Kingdom; Australia; Malaysia; Singapore; Venezuela; Safe Harbor and Directive 95/46/EC.
Getting Permission to HackConfidentiality Agreement; Company Obligations; Contractor Obligations; Auditing and Monitoring; Conflict Management; Summary; References; Chapter 3: Setting up Your Lab; Introduction; Targets in a Pentest Lab; Problems with Learning to Hack; Real-World Scenarios; Turn-Key Scenarios; What Is a LiveCD?; De-ICE; Hackerdemia; Open Web Application Security Project; Virtual Network Pentest Labs; Keeping It Simple; Virtualization Software; Router configuration; Computer configuration; VM; Downloads for Virtual Network; Starting the Virtual Images
Protecting Penetration Test DataEncryption Schemas; Data Encryption; Data Hashing; Securing Pentest Systems; Mobile Security Concerns; Wireless Lab Data; Advanced Pentest Labs; Hardware Considerations; Routers; Firewalls; Intrusion Detection System/Intrusion Prevention System; Hardware Configuration; De-ICE Network Challenges; Network Architecture; Operating Systems and Applications; Operating Systems; Applications; Analyzing Malware-Viruses and Worms; Virtual Versus Nonvirtual Labs; Creating a Controlled Environment; Harvesting Malware; Information Analysis; Other Target Ideas; CTF Events
Web-Based ChallengesVulnerability Announcements; Summary; Reference; Chapter 4: Methodologies and Frameworks; Introduction; Information System Security Assessment Framework; Planning and Preparation-Phase I; Phase I: Planning and Preparation; Assessment-Phase II; Network Security; Host Security; Application Security; Database Security; Social Engineering; Reporting, Clean-up, and Destroy Artifacts-Phase III; Reporting; Clean-up and Destroy Artifacts; Open Source Security Testing Methodology Manual; Rules of Engagement; Channels; Human Security; Physical Security; Wireless Communications
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices
Beschreibung:464 pages
ISBN:9780124046184
0124046185

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!