官术网_书友最值得收藏!

Summary

In this chapter, we focused on all that is necessary to prepare and plan for a successful penetration test. We discussed the differences between penetration testing and vulnerability assessments.

The steps involved with proper scoping were detailed, as were the necessary steps to ensure all information has been gathered prior to testing. One thing to remember is that proper scoping and planning are just as important as ensuring you test against the latest and greatest vulnerabilities.

Last but not least, we discussed three very powerful tools that allow you to perform data collections and that offer reporting features: MagicTree, which is a powerhouse of data collection and analysis; Dradis, which is incredible in its ability to allow centralized data collection and sharing; and KeepNote, which provides us with a note taking capability to support the others.

In the next chapter, we will learn about various reconnaissance techniques and why they are needed. Some of these include effective use of Internet search engines to locate company and employee data, manipulating and reading metadata from various file types, and fully exploiting the power of DNS to make the task of penetration testing easier.

主站蜘蛛池模板: 吴旗县| 周至县| 临海市| 弋阳县| 禄劝| 崇左市| 灯塔市| 资兴市| 探索| 会理县| 正镶白旗| 西城区| 安阳市| 历史| 商城县| 北川| 安溪县| 子长县| 崇礼县| 福安市| 高唐县| 定日县| 灵台县| 长垣县| 岑溪市| 饶平县| 荔波县| 金秀| 陇南市| 神农架林区| 桃园县| 福海县| 隆子县| 驻马店市| 明溪县| 迁安市| 渭南市| 静安区| 讷河市| 通州区| 南阳市|