- Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
- Lee Allen
- 227字
- 2021-08-06 19:58:31
Summary
In this chapter, we focused on all that is necessary to prepare and plan for a successful penetration test. We discussed the differences between penetration testing and vulnerability assessments.
The steps involved with proper scoping were detailed, as were the necessary steps to ensure all information has been gathered prior to testing. One thing to remember is that proper scoping and planning is just as important as ensuring you test against the latest and greatest vulnerabilities.
We have also discussed the installation of VirtualBox and BackTrack and have provided the instructions necessary to not only install BackTrack from the ISO, but also how to keep it updated. In addition to this, we have also provided instructions on how to install OpenOffice on BackTrack.
Last but not least, we have discussed two very powerful tools that allow you to perform data collections and that offer reporting features. MagicTree, which is a powerhouse of data collection and analysis, and Dradis, which is incredible in its ability to allow for centralized data collection and sharing.
In the next chapter, we learn about various reconnaissance techniques and why they are needed. Some of these include effective use of Internet search engines to locate company and employee data, manipulating and reading metadata from various file types, and fully exploiting the power of DNS to make the task of penetration testing easier.
- 連接未來:從古登堡到谷歌的網絡革命
- Web安全防護指南:基礎篇
- 物聯網檢驗檢測技術
- Oracle SOA Suite 11g Performance Tuning Cookbook
- 計算機網絡與數據通信
- 互聯網安全的40個智慧洞見:2014年中國互聯網安全大會文集
- 雷達饋線技術
- 物聯網場景設計與開發(初級)
- Learning Windows 8 Game Development
- 物聯網工程概論
- AWS Lambda Quick Start Guide
- TCP/IP基礎(第2版)
- 5G非正交多址接入技術:理論、算法與實現
- 新媒體交互藝術
- Enterprise ApplicationDevelopment with Ext JSand Spring