Cargando…

Professional penetration testing: creating and operating a formal hacking lab

PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II -...

Descripción completa

Detalles Bibliográficos
Autor principal: Wilhelm, Thomas
Lenguaje:eng
Publicado: Elsevier 2009
Materias:
Acceso en línea:http://cds.cern.ch/record/1320356
_version_ 1780921519022538752
author Wilhelm, Thomas
author_facet Wilhelm, Thomas
author_sort Wilhelm, Thomas
collection CERN
description PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. Chap
id cern-1320356
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher Elsevier
record_format invenio
spelling cern-13203562021-04-22T01:09:33Zhttp://cds.cern.ch/record/1320356engWilhelm, ThomasProfessional penetration testing: creating and operating a formal hacking labComputing and ComputersPART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. ChapElsevieroai:cds.cern.ch:13203562009
spellingShingle Computing and Computers
Wilhelm, Thomas
Professional penetration testing: creating and operating a formal hacking lab
title Professional penetration testing: creating and operating a formal hacking lab
title_full Professional penetration testing: creating and operating a formal hacking lab
title_fullStr Professional penetration testing: creating and operating a formal hacking lab
title_full_unstemmed Professional penetration testing: creating and operating a formal hacking lab
title_short Professional penetration testing: creating and operating a formal hacking lab
title_sort professional penetration testing: creating and operating a formal hacking lab
topic Computing and Computers
url http://cds.cern.ch/record/1320356
work_keys_str_mv AT wilhelmthomas professionalpenetrationtestingcreatingandoperatingaformalhackinglab