Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Wilhelm, Thomas.

Title Professional Penetration Testing : Creating and Learning in a Hacking Lab.

Publication Info. Burlington : Elsevier Science, 2013.

Item Status

Description 1 online resource (464 pages)
Physical Medium polychrome
Description text file
Contents Front Cover; Professional Penetration Testing: Creating and Learning in a Hacking Lab; Copyright; Contents; Preface; About the Author; About the Technical Editor; Acknowledgments; Family; HackingDojo.com; On the Side; Chapter 1: Introduction; Introduction; About This Edition; Getting Setup; Performing the Penetration Test; Internal Pentesting; Personal Skills; Download Links and Support Files; HackingDojo.com; Virtual Images; Hardware Configuration Files; Summary; Chapter 2: Ethics and Hacking; Getting Permission to Hack; Code of Ethics Canons [(ISC)2]; Why Stay Ethical?; Black Hat Hackers.
White Hat HackersGray Hat Hackers; Ethical Standards; Certifications; Contractor; Employer; Educational and Institutional Organizations; Information Systems Security Association; Internet Activities Board; Institute of Electrical and Electronics Engineers; Organization for Economic Cooperation and Development; Computer Crime Laws; Types of Laws; Civil Law; Criminal Law; Administrative/Regulatory Law; Type of Computer Crimes and Attacks; U.S. Federal Laws; U.S. State Laws; International Laws; Canada; United Kingdom; Australia; Malaysia; Singapore; Venezuela; Safe Harbor and Directive 95/46/EC.
Getting Permission to HackConfidentiality Agreement; Company Obligations; Contractor Obligations; Auditing and Monitoring; Conflict Management; Summary; References; Chapter 3: Setting up Your Lab; Introduction; Targets in a Pentest Lab; Problems with Learning to Hack; Real-World Scenarios; Turn-Key Scenarios; What Is a LiveCD?; De-ICE; Hackerdemia; Open Web Application Security Project; Virtual Network Pentest Labs; Keeping It Simple; Virtualization Software; Router configuration; Computer configuration; VM; Downloads for Virtual Network; Starting the Virtual Images.
Protecting Penetration Test DataEncryption Schemas; Data Encryption; Data Hashing; Securing Pentest Systems; Mobile Security Concerns; Wireless Lab Data; Advanced Pentest Labs; Hardware Considerations; Routers; Firewalls; Intrusion Detection System/Intrusion Prevention System; Hardware Configuration; De-ICE Network Challenges; Network Architecture; Operating Systems and Applications; Operating Systems; Applications; Analyzing Malware-Viruses and Worms; Virtual Versus Nonvirtual Labs; Creating a Controlled Environment; Harvesting Malware; Information Analysis; Other Target Ideas; CTF Events.
Web-Based ChallengesVulnerability Announcements; Summary; Reference; Chapter 4: Methodologies and Frameworks; Introduction; Information System Security Assessment Framework; Planning and Preparation-Phase I; Phase I: Planning and Preparation; Assessment-Phase II; Network Security; Host Security; Application Security; Database Security; Social Engineering; Reporting, Clean-up, and Destroy Artifacts-Phase III; Reporting; Clean-up and Destroy Artifacts; Open Source Security Testing Methodology Manual; Rules of Engagement; Channels; Human Security; Physical Security; Wireless Communications.
Note Telecommunications.
Summary Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer security -- Examinations -- Practice.
Computer security -- Examinations.
Computer security.
Genre/Form Electronic books.
Other Form: Print version: Wilhelm, Thomas. Professional Penetration Testing. Burlington : Elsevier Science, 2013 9780124046184
ISBN 9780124046184 (electronic book)
0124046185 (electronic book)