Book description
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs.
Table of contents
- Dedication
- About the Author
- Foreword
- Acknowledgments
- Introduction
- Penetration Testing Primer
-
I. The Basics
-
1. Setting Up Your Virtual Lab
- Installing VMware
- Setting Up Kali Linux
- Target Virtual Machines
-
Creating the Windows XP Target
- VMware Player on Microsoft Windows
- VMware Fusion on Mac OS
- Installing and Activating Windows
- Installing VMware Tools
- Turning Off Windows Firewall
- Setting User Passwords
- Setting a Static IP Address
- Making XP Act Like Itâs a Member of a Windows Domain
- Installing Vulnerable Software
- Installing Immunity Debugger and Mona
- Setting Up the Ubuntu 8.10 Target
- Creating the Windows 7 Target
- Summary
-
2. Using Kali Linux
- Linux Command Line
- The Linux Filesystem
- Learning About Commands: The Man Pages
- User Privileges
- File Permissions
- Editing Files
- Data Manipulation
- Managing Installed Packages
- Processes and Services
- Managing Networking
- Netcat: The Swiss Army Knife of TCP/IP Connections
- Automating Tasks with cron Jobs
- Summary
- 3. Programming
- 4. Using the Metasploit Framework
-
1. Setting Up Your Virtual Lab
-
II. Assessments
- 5. Information Gathering
- 6. Finding Vulnerabilities
- 7. Capturing Traffic
-
III. Attacks
- 8. Exploitation
- 9. Password Attacks
- 10. Client-Side Exploitation
- 11. Social Engineering
- 12. Bypassing Antivirus Applications
- 13. Post Exploitation
- 14. Web Application Testing
- 15. Wireless Attacks
-
IV. Exploit Development
- 16. A Stack-Based Buffer Overflow in Linux
- 17. A Stack-Based Buffer Overflow in Windows
- 18. Structured Exception Handler Overwrites
- 19. Fuzzing, Porting Exploits, and Metasploit Modules
- V. Mobile Hacking
-
A. Resources
- Chapter 0: Penetration Testing Primer
- Chapter 2: Using Kali Linux
- Chapter 3: Programming
- Chapter 4: Using the Metasploit Framework
- Chapter 5: Information Gathering
- Chapter 6: Finding Vulnerabilities
- Chapter 7: Capturing Traffic
- Chapter 8: Exploitation
- Chapter 9: Password Attacks
- Chapter 11: Social Engineering
- Chapter 12: Bypassing Antivirus Applications
- Chapter 13: Post Exploitation
- Chapter 14: Web Application Testing
- Chapter 15: Wireless Attacks
- Chapters 16â19: Exploit Development
- Chapter 20: Using the Smartphone Pentest Framework
- Courses
- Downloading the Software to Build Your Virtual Lab
- Index
- About the Author
- Copyright
Product information
- Title: Penetration Testing
- Author(s):
- Release date: May 2014
- Publisher(s): No Starch Press
- ISBN: 9781593275648
You might also like
book
Practical Web Penetration Testing
Learn how to execute web application penetration testing end-to-endAbout This Book Build an end-to-end threat model …
book
The Art of Network Penetration Testing
Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats …
book
Penetration Testing: A Survival Guide
A complete pentesting guide facilitating smooth backtracking for working hackers About This Book Conduct network testing, …
book
Advanced Infrastructure Penetration Testing
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant …