- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 192字
- 2021-07-09 20:20:40
Summary
In this chapter, we focused on all that is necessary to prepare and plan for a successful penetration test. We discussed the differences between penetration testing and vulnerability assessments.
The steps involved with proper scoping were detailed, as were the necessary steps to ensure all information has been gathered prior to testing. One thing to remember is that proper scoping and planning are just as important as ensuring you test against the latest and greatest vulnerabilities.
Last but not least, we discussed three very powerful tools that allow you to perform data collections and that offer reporting features: MagicTree, which is a powerhouse of data collection and analysis; Dradis, which is incredible in its ability to allow centralized data collection and sharing; and KeepNote, which provides us with a note taking capability to support the others.
In the next chapter, we will learn about various reconnaissance techniques and why they are needed. Some of these include effective use of Internet search engines to locate company and employee data, manipulating and reading metadata from various file types, and fully exploiting the power of DNS to make the task of penetration testing easier.
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 信息系統(tǒng)安全檢測與風(fēng)險評估
- 數(shù)據(jù)安全實踐指南
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- 網(wǎng)絡(luò)空間安全實驗
- API安全技術(shù)與實戰(zhàn)
- 情報驅(qū)動應(yīng)急響應(yīng)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 編譯與反編譯技術(shù)實戰(zhàn)
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- 黑客攻防實戰(zhàn)從入門到精通
- 持續(xù)集成:軟件質(zhì)量改進和風(fēng)險降低之道
- 聯(lián)邦學(xué)習(xí)原理與算法
- 社會工程:防范釣魚欺詐(卷3)
- 數(shù)據(jù)安全實踐:能力體系、產(chǎn)品實現(xiàn)與解決方案