close menu
Bookswagon-24x7 online bookstore
close menu
My Account
28%
Penetration Testing Essentials: (English)

Penetration Testing Essentials: (English)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you'll use to discover the weak spots before others do. You'll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You'll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications.

IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.

  • Learn the fundamentals of security and cryptography
  • Master breaking, entering, and maintaining access to a system
  • Escape and evade detection while covering your tracks
  • Build your pen testing lab and the essential toolbox

Start developing the tools and mindset you need to become experienced in pen testing today.



Table of Contents:
Introduction xvii

Chapter 1 Introduction to Penetration Testing 1

Defining Penetration Testing 1

Preserving Confidentiality, Integrity, and Availability 4

Appreciating the Evolution of Hacking 5

Chapter 2 Introduction to Operating Systems and Networking 15

Comparing Common Operating Systems 15

Exploring Networking Concepts 21

Chapter 3 Introduction to Cryptography 37

Recognizing the Four Goals of Cryptography 37

The History of Encryption 38

Speaking Intelligently About Cryptography 39

Comparing Symmetric and Asymmetric Cryptography 41

Transforming Data via Hashing 47

A Hybrid System: Using Digital Signatures 48

Working with PKI 50

Chapter 4 Outlining the Pen Testing Methodology 55

Determining the Objective and Scope of the Job 55

Choosing the Type of Test to Perform 58

Gaining Permission via a Contract 60

Following the Law While Testing68

Chapter 5 Gathering Intelligence 71

Introduction to Intelligence Gathering 71

Examining a Company’s Web Presence 73

Finding Websites That Don’t Exist Anymore 77

Gathering Information with Search Engines 78

Targeting Employees with People Searches 80

Discovering Location 81

Do Some Social Networking 82

Looking via Financial Services 85

Investigating Job Boards 86

Searching Email 86

Extracting Technical Information 87

Chapter 6 Scanning and Enumeration 89

Introduction to Scanning89

Checking for Live Systems 91

Performing Port Scanning 96

Identifying an Operating System 107

Scanning for Vulnerabilities 110

Using Proxies (Or Keeping Your Head Down) 110

Performing Enumeration 112

Chapter 7 Conducting Vulnerability Scanning 121

Introduction to Vulnerability Scanning 122

Recognizing the Limitations of Vulnerability Scanning 123

Outlining the Vulnerability Scanning Process 124

Types of Scans That Can Be Performed 127

Chapter 8 Cracking Passwords 129

Recognizing Strong Passwords 129

Choosing a Password-Cracking Technique 130

Executing a Passive Online Attack 131

Executing an Active Online Attack 133

Executing an Offline Attack 134

Using Nontechnical Methods 137

Escalating Privileges 140

Chapter 9 Retaining Access with Backdoors and Malware 143

Deciding How to Attack 143

Installing a Backdoor with PsTools 144

Opening a Shell with LAN Turtle 145

Recognizing Types of Malware 146

Launching Viruses 147

Launching Worms 153

Launching Spyware 153

Inserting Trojans154

Installing Rootkits 159

Chapter 10 Reporting 161

Reporting the Test Parameters 161

Collecting Information 163

Highlighting the Important Information 164

Adding Supporting Documentation 168

Conducting Quality Assurance 169

Chapter 11 Working with Defensive and Detection Systems 171

Detecting Intrusions 171

Recognizing the Signs of an Intrusion 176

Evading an IDS 179

Breaching a Firewall 182

Using Honeypots: The Wolf in Sheep’s Clothing 189

Chapter 12 Covering Your Tracks and Evading Detection 193

Recognizing the Motivations for Evasion 193

Getting Rid of Log Files 194

Hiding Files 201

Evading Antivirus Software 208

Evading Defenses by Entering Through a Backdoor210

Using Rootkits for Evasion 211

Chapter 13 Detecting and Targeting Wireless 213

An Introduction to Wireless 213

Breaking Wireless Encryption Technologies 222

Conducting a Wardriving Attack 230

Conducting Other Types of Attack 232

Choosing Tools to Attack Wireless 234

Knocking Out Bluetooth 237

Hacking the Internet of Things (IoT)240

Chapter 14 Dealing with Mobile Device Security 243

Recognizing Current-Generation Mobile Devices 243

Working with Android OS 248

Working with Apple iOS 254

Finding Security Holes in Mobile Devices 256

Encountering Bring Your Own Device (BYOD) 257

Choosing Tools to Test Mobile Devices 258

Chapter 15 Performing Social Engineering 261

Introduction to Social Engineering 261

Exploiting Human Traits 263

Acting Like a Social Engineer 264

Targeting Specific Victims 265

Leveraging Social Networking 267

Conducting Safer Social Networking 268

Chapter 16 Hardening a Host System 271

Introduction to Hardening 271

Three Tenets of Defense 273

Creating a Security Baseline 276

Hardening with Group Policy 279

Hardening Desktop Security 279

Backing Up a System 289

Chapter 17 Hardening Your Network 291

Introduction to Network Hardening 291

Intrusion Detection Systems 292

Firewalls 296

Physical Security Controls 302

Chapter 18 Navigating the Path to Job Success 305

Choosing Your Career Path 305

Build a Library 307

Practice Technical Writing 309

Display Your Skills 309

Chapter 19 Building a Test Lab for Penetration Testing 311

Deciding to Build a Lab 311

Considering Virtualization 313

Getting Starting and What You Will Need 316

Installing Software 317

Appendix Answers to Review Questions 319

Index 331


Best Seller

| | See All

Product Details
  • ISBN-13: 9781119235309
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Edition: PAP/PSC
  • Language: English
  • Returnable: N
  • Spine Width: 20 mm
  • Width: 188 mm
  • ISBN-10: 1119235308
  • Publisher Date: 23 Dec 2016
  • Binding: Paperback
  • Height: 234 mm
  • No of Pages: 360
  • Series Title: English
  • Weight: 476 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Penetration Testing Essentials: (English)
John Wiley & Sons Inc -
Penetration Testing Essentials: (English)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Penetration Testing Essentials: (English)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA