Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills.

Saved in:
Bibliographic Details
Author / Creator:Pillay, Rishalin.
Imprint:Birmingham : Packt Publishing, Limited, 2019.
Description:1 online resource (412 pages)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/14140195
Hidden Bibliographic Details
ISBN:1838644164
9781838644161
9781838640163
Notes:Configuring your browser
Includes bibliographical references.
Print version record.
Summary:A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to ...
Other form:Print version: Pillay, Rishalin. Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills. Birmingham : Packt Publishing, Limited, ©2019 9781838640163
Table of Contents:
  • Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Section 1: The Basics; Chapter 1: Introduction to Penetration Testing; Technical requirements; What is penetration testing?; Stages of a penetration test; Pre-engagement; Scoping; Timelines; Dealing with third parties; Payment; Your ""get out of jail free card; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post-exploitation; Reporting; Executive summary; Technical report; Getting started with your lab
  • Creating virtual machines in VMware, Hyper-V, and VirtualBoxMicrosoft Hyper-V; VMware; VirtualBox; Target machines; Metasploitable; Summary; Questions; Chapter 2: Getting Started with Kali Linux; Technical requirements; An introduction to Kali Linux; Installing and configuring Kali Linux; Installation; Installing Kali Linux on macOS; Installing Kali Linux using the Windows Subsystem for Linux (WSL); Installing Kali Linux using VirtualBox; Configuring Kali Linux; Basic commands in Kali Linux; Scripting in Kali Linux; The essential tools of Kali Linux; Nmap; Aircrack-ng
  • John the Ripper (JTR) and HydraSET; Burp Suite; Summary; Questions; Section 2: Exploitation; Chapter 3: Performing Information Gathering; Technical requirements; Passive information gathering; Using the internet; Google dorks; Shodan; Shodan scripting; Using Kali Linux; Maltego; Active information gathering; Nmap; Vulnerability scanning; OpenVAS; Nessus; Capturing traffic; Wireshark; tcpdump; Summary; Questions; Chapter 4: Mastering Social Engineering; Technical requirements; What is social engineering?; Pretexting; Phishing; Spear phishing; Tailgating; Social engineering tools
  • The social engineering toolkit (SET)Gophish; Modlishka; Wifiphisher; Creating a social engineering campaign; Installing Modlishka; Executing the attack; Using SET to create a phishing campaign; Summary; Questions; Chapter 5: Diving into the Metasploit Framework; Technical requirements; Introducing Metasploit; Updating the Metasploit Framework; Linking the Metasploit Framework to a database; Enhancing your experience within Metasploit; Using Metasploit to exploit a remote target; Finding modules; Exploit-DB; Rapid7 exploit database; 0day.today; Adding modules
  • Metasploit options, shells, and payloadsOptions; Shells; Payloads; Working with MSFvenom; Summary; Questions; Chapter 6: Understanding Password Attacks; Technical requirements; Introduction to password attacks; Working with wordlists; Password profiling; Password mutation; Offline password attacks; John the Ripper; Hashcat; Online password attacks; Hydra; Medusa; Ncrack; Dumping passwords from memory; Summary; Questions; Chapter 7: Working with Burp Suite; Technical requirements; Understanding Burp Suite; Preparing your environment; Installing Burp Suite Professional; Setting up OWASP BWA