官术网_书友最值得收藏!

Summary

In this chapter, we focused on all that is necessary to prepare and plan for a successful penetration test. We discussed the differences between penetration testing and vulnerability assessments.

The steps involved with proper scoping were detailed, as were the necessary steps to ensure all information has been gathered prior to testing. One thing to remember is that proper scoping and planning are just as important as ensuring you test against the latest and greatest vulnerabilities.

Last but not least, we discussed three very powerful tools that allow you to perform data collections and that offer reporting features: MagicTree, which is a powerhouse of data collection and analysis; Dradis, which is incredible in its ability to allow centralized data collection and sharing; and KeepNote, which provides us with a note taking capability to support the others.

In the next chapter, we will learn about various reconnaissance techniques and why they are needed. Some of these include effective use of Internet search engines to locate company and employee data, manipulating and reading metadata from various file types, and fully exploiting the power of DNS to make the task of penetration testing easier.

主站蜘蛛池模板: 秦皇岛市| 静海县| 武安市| 女性| 万荣县| 阳高县| 百色市| 繁峙县| 胶州市| 商丘市| 图片| 团风县| 宜兰市| 衡南县| 长治市| 邹平县| 景泰县| 秭归县| 达尔| 湘潭县| 九龙县| 鄂伦春自治旗| 开化县| 陆良县| 深水埗区| 巴彦淖尔市| 东阿县| 隆回县| 新乡县| 许昌县| 万州区| 和静县| 石泉县| 咸阳市| 通江县| 卓尼县| 广宗县| 桐柏县| 苏尼特左旗| 卓资县| 云林县|