Description This handbook describes how to perform an intrusion test into an operating system, network or web application. Following an introduction of some essential theoretical notions, the most important tools and techniques for leading an offensive are explained in detail for every single stage of the pentest. Who is this book for? For those who want to know more about applied Cyber security, have basic computer skills and are intrigued by the potential of Unix-like universe. The paper can also be useful for the professional pentester, who will have some samples of typical scenarios and attacks that can be quickly accessed. Topics Pre-engagement Information gathering Vulnerability assessment Exploitation Privilege escalation Post exploitation Reporting Penstesting cheatsheet
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.