- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 195字
- 2021-07-09 20:20:36
Summary
In this chapter, we discussed the need for a methodology when it comes to penetration testing and how it is essential when it comes to building skills as a professional penetration tester. Following this, we reviewed two sample methodologies. We reviewed the penetration testing framework and described the components within the standards, to include the process to follow based on the ports that are discovered during your assessments. The next methodology we discussed was the PTES, and although there is no technical guidance as part of the standard, there is a reference for the technical information that is available. We provided a reference for that, along with a number of examples on how to perform the testing for each step. The last methodology we looked at was a high-level abstraction that shows the potential components of a professional security test.
In the next chapter, we review the steps required to build the range that we will use throughout the rest of the book. At the end of the next chapter, we will have a complete range that allows us to practice virtually all testing methods against any of the targets that we may encounter.
- Node Security
- 信息安全導論(在線實驗+在線自測)
- Mobile Forensics Cookbook
- 數字身份與元宇宙信任治理
- 開發者的Web安全戒律:真實威脅與防御實踐
- 安全技術運營:方法與實踐
- Python Penetration Testing Cookbook
- 模糊測試:強制發掘安全漏洞的利器
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Bug Bounty Hunting Essentials
- Mastering Python for Networking and Security
- CTF快速上手:PicoCTF真題解析(Web篇)
- 計算機網絡安全實驗指導
- 網絡空間安全實戰基礎
- ATT&CK與威脅獵殺實戰