Cargando…
Professional penetration testing: creating and operating a formal hacking lab
PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II -...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1320356 |
_version_ | 1780921519022538752 |
---|---|
author | Wilhelm, Thomas |
author_facet | Wilhelm, Thomas |
author_sort | Wilhelm, Thomas |
collection | CERN |
description | PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. Chap |
id | cern-1320356 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-13203562021-04-22T01:09:33Zhttp://cds.cern.ch/record/1320356engWilhelm, ThomasProfessional penetration testing: creating and operating a formal hacking labComputing and ComputersPART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. ChapElsevieroai:cds.cern.ch:13203562009 |
spellingShingle | Computing and Computers Wilhelm, Thomas Professional penetration testing: creating and operating a formal hacking lab |
title | Professional penetration testing: creating and operating a formal hacking lab |
title_full | Professional penetration testing: creating and operating a formal hacking lab |
title_fullStr | Professional penetration testing: creating and operating a formal hacking lab |
title_full_unstemmed | Professional penetration testing: creating and operating a formal hacking lab |
title_short | Professional penetration testing: creating and operating a formal hacking lab |
title_sort | professional penetration testing: creating and operating a formal hacking lab |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1320356 |
work_keys_str_mv | AT wilhelmthomas professionalpenetrationtestingcreatingandoperatingaformalhackinglab |