Penetration Testing Essentials.
Material type:
- text
- computer
- online resource
- 9781119323983
- 005.8
- QA76.9.A25 .O759 2017
Intro -- Penetration Testing Essentials -- Acknowledgments -- About the Author -- Contents at a Glance -- Contents -- Introduction -- Who Should Read This Book? -- What You Need -- What's Covered in This Book -- Chapter 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Defining What a Penetration Tester Does -- Recognizing Your Opponents -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- The Role of the Internet -- The Hacker Hall of Fame (or Shame) -- Recognizing How Hacking Is Categorized Under the Law -- Chapter 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Microsoft Windows -- Mac OS -- Linux -- Unix -- Exploring Networking Concepts -- Open System Interconnection Model -- The TCP/IP Suite -- IP Addresses -- IP Address Formatting -- Network Devices -- Chapter 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Symmetric Cryptography -- Asymmetric (Public-Key) Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- Authenticating the Certificate -- Building a Public Key Infrastructure (PKI) Structure -- Chapter 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Gathering Intelligence -- Scanning and Enumeration -- Penetrating the Target -- Maintaining Access -- Covering Your Tracks -- Documenting the Findings of the Test -- Exploring the Process According to EC-Council -- Following the Law While Testing -- Chapter 5 Gathering Intelligence -- Introduction to Intelligence Gathering.
Categorizing the Types of Information -- Categorizing the Gathering Methods -- Examining a Company's Web Presence -- Viewing a Website Offline -- Finding Subdomains -- Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Hacking with Google -- Getting Search Engine Alerts -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- Chapter 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Full Open Scan or Port Scan -- Stealth Scan or Half-Open Scan -- Xmas Tree Scan -- FIN Scan -- NULL Scan -- ACK Scanning -- Fragmenting -- UDP Scanning -- Identifying an Operating System -- Banner Grabbing -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- The Onion Router (Tor) -- Performing Enumeration -- Ports of Interest -- Exploiting Email IDs -- SMTP Enumeration -- Commonly Exploited Services -- NetBIOS -- NULL Sessions -- Chapter 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Conducting a Periodic Assessmenton Existing Devices -- Conducting a New System Assessment -- Understanding What to Scan -- Mitigating Risks -- Types of Scans That Can Be Performed -- Chapter 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Network Sniffing or Packet Analysis -- Man-in-the-Middle -- Executing an Active Online Attack -- Password Guessing -- Malware -- Executing an Offline Attack -- Precomputed Hashes or Rainbow Tables -- Using Nontechnical Methods -- Default Passwords.
Guessing -- Stealing Passwords with Flash Drives -- Escalating Privileges -- Chapter 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Life Cycle of a Virus -- Types of Virus -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Working with Netcat -- Talking with Netcat -- Sending Files through Netcat -- Installing Rootkits -- Chapter 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- Chapter 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Network-Based Intrusion Detection -- Types of Network Detection Engines -- Host-Based Intrusion Detection -- Intrusion Prevention Systems -- Recognizing the Signs of an Intrusion -- Host System Intrusions -- Unified Threat Management -- Network Intrusion Indicators -- Ambiguous Signs of Intrusion -- Evading an IDS -- Targeting the IDS -- Obfuscating -- Using Covert Channels -- Crying Wolf -- Evading through Encryption -- Breaching a Firewall -- Firewall Configurations -- Types of Firewalls -- Getting to Know Your Target -- Firewalking a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- Detecting Honeypots -- Problems with Honeypots -- Chapter 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Disabling the Logging Process in Windows -- Removing Events from a Log File -- Clearing Event Logs on Linux Computers -- Erasing the Command History -- Hiding Files -- Hiding Files with Alternate Data Streams (NTFS) -- Hiding Files with Steganography -- Evading Antivirus Software -- Evading Defenses by Entering Through a Backdoor.
Using Rootkits for Evasion -- Chapter 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Recognizing Wireless Standards -- Comparing 5 GHz and 2.4 GHz Wireless Networks -- Recognizing the Components of a Wireless Network -- Wi-Fi Authentication Modes -- Breaking Wireless Encryption Technologies -- Cracking WEP -- Moving from WEP to WPA -- Cracking WPA and WPA 2 -- Exploring Wireless Deployment Options -- Mitigating Attacks Over WEP and WPA -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Picking a Utility -- Choosing the Right Wireless Card -- Knocking Out Bluetooth -- Types of Bluetooth Attacks -- Things to Remember About Bluetooth -- Hacking the Internet of Things (IoT) -- Chapter 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Mobile OS Versions and Models -- Threats to Mobile Devices -- Goals of Mobile Security -- Working with Android OS -- Rooting on Android -- Playing in a Sandbox -- Building a Custom Droid -- Working with Apple iOS -- Jailbreaking Apple's iOS -- Finding Security Holes in Mobile Devices -- Cracking Mobile Passwords -- Finding Unprotected Networks -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- Chapter 15 Per forming Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- Chapter 16 Hardening a Host System -- Introduction to Hardening -- Three Tenets of Defense -- Following a Defense-in-Depth Approach -- Implementing Implicit Deny -- Implementing Least Privilege -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Managing Patches -- Hardening Passwords.
Being Careful When Installing Software -- Using Antivirus Packages -- Backing Up a System -- Chapter 17 Hardening Your Network -- Introduction to Network Hardening -- What Is Hardening a Network? -- Intrusion Detection Systems -- Putting It Together -- Components of HIDS -- Limitations of IDS -- Investigation of an Event -- Firewalls -- Firewall Methodologies -- Limitations of a Firewall -- Implementing a Firewall -- Authoring a Firewall Policy -- Network Connection Policy -- Physical Security Controls -- Chapter 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- Chapter 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Advantages of Virtualization -- Disadvantages of Virtualization -- Getting Starting and What You Will Need -- Installing Software -- Appendix Answers to Review Questions -- Chapter 1: Introduction to Penetration Testing -- Chapter 2: Introduction to Operating Systems and Networking -- Chapter 3: Introduction to Cryptography -- Chapter 4: Outlining the Pentesting Methodology -- Chapter 5: Gathering Intelligence -- Chapter 6: Scanning and Enumeration -- Chapter 7: Conducting Vulnerability Scanning -- Chapter 8: Cracking Passwords -- Chapter 9: Retaining Accesswith Backdoors and Malware -- Chapter 10: Reporting -- Chapter 11: Working with Defensive and Detection Systems -- Chapter 12: Covering Your Tracks and Evading Detection -- Chapter 13: Detecting and Targeting Wireless -- Chapter 14: Dealing with Mobile Device Security -- Chapter 15: Performing Social Engineering -- Chapter 16: Hardening a Host System -- Chapter 17: Hardening Your Network -- Chapter 18: Navigating the Path to Job Success -- Chapter 19: Building a Test Lab for Penetration Testing -- Index -- EULA.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.