Скачать книгу

rel="nofollow" href="#ulink_c48c8332-df17-5c8f-9964-1a0aea7a0ba4">Toolkit Fundamentals Understanding Denial of Service (DoS) Attacks Buffer Overflow Attacks Fragmentation Attacks Smurf Attacks Tiny Packet Attacks Xmas Tree Attacks Chapter 7: Destroy (Malware) Toolkit Fundamentals Malware Ransomware Other Types of Destroy Attacks Chapter 8: Subvert (Controls Bypass) Toolkit Fundamentals Attack Vectors Phishing Spoofing Malware

      5  Part 3: Diving In: Preparations and Testing Chapter 9: Preparing for the Pen Test Handling the Preliminary Logistics Gathering Requirements Coming Up with a Plan Having a Backout Plan Chapter 10: Conducting a Penetration Test Attack! Looking at the Pen Test from Inside Documenting Your Every Move Other Capture Methods and Vectors Assessment Prevention

      6  Part 4: Creating a Pen Test Report Chapter 11: Reporting Structuring the Pen Test Report Creating a Professional and Accurate Report Delivering the Report: Report Out Fundamentals Updating the Risk Register Chapter 12: Making Recommendations Understanding Why Recommendations Are Necessary Seeing How Assessments Fit into Recommendations Networks Systems General Security Recommendations: All Systems More Recommendations Chapter 13: Retesting Looking at the Benefits of Retesting Understanding the Reiterative Nature of Pen Testing and Retesting Determining When to Retest Choosing What to Retest Running a Pen Retest

      7  Part 5: The Part of Tens Chapter 14: Top Ten Myths About Pen Testing All Forms of Ethical Hacking Are the Same We Can’t Afford a Pen Tester We Can’t Trust a Pen Tester We Don’t Trust the Tools Pen Tests Are Not Done Often Pen Tests Are Only for Technical Systems Contractors Can’t Make Great Pen Testers Pen Test Tool Kits Must Be Standardized Pen Testing Itself Is a Myth and Unneeded Pen Testers Know Enough and Don’t Need to Continue to Learn Chapter 15: Ten Tips to Refine Your Pen Testing Skills Continue Your Education Build Your Toolkit Think outside the Box Think Like a Hacker Get Involved Use a Lab Stay Informed Stay Ahead of New Technologies Build Your Reputation Learn about Physical Security Chapter 16: Ten Sites to Learn More About Pen Testing SANS Institute GIAC Certifications Software Engineering Institute (Assorted)

Скачать книгу