Search Results - "penetration test"

Refine Results
  1. 1

    Penetration testing in the UK proceedings of the geotechnology conference organized by the Institution of Civil Engineers and held in Birmingham on 6-8 July 1988

    Published 1989
    Subjects: “…Soil penetration test Congresses…”
    Book
  2. 2

    Penetration testing essentials by Oriyano, Sean-Philip

    Published 2017
    Book
  3. 3

    Advanced penetration testing hacking the world's most secure networks by Allsopp, Wil

    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Book
  4. 4

    The basics of hacking and penetration testing ethical hacking and penetration testing made easy by Engebretson, Pat (Patrick Henry)

    Published 2013
    Table of Contents: “…What is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Social engineering -- Web Based Exploitation -- Post Exploitation and Maintaining Access with Backdoors, Rootkits, and meterpreter -- Wrapping Up the Penetration Test.…”
    Book
  5. 5

    Computer security and penetration testing by Basta, Alfred

    Published 2008
    Book
  6. 6

    Cone penetration testing in geotechnical practice by Lunne, Tom

    Published 1997
    Table of Contents: “…Geo-Environmental Applications of Penetration Testing -- 9. Examples -- 10. Future Trends -- App. …”
    Book
  7. 7
  8. 8
  9. 9

    Hacking with kali practical penetration testing techniques by Broad, James

    Published 2014
    Table of Contents: “…ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary.…”
    Book
  10. 10

    Ninja hacking unconventional penetration testing tactics and techniques by Wilhelm, Thomas

    Published 2011
    Subjects: “…Penetration testing (Computer security)…”
    Book
  11. 11

    Kali Linux cookbook effective penetration testing solutions by Schultz, Corey P., Perciaccante, Bob

    Published 2017
    Book
  12. 12

    Computer and information security handbook

    Published 2013
    Subjects: “…Penetration testing (Computer security).…”
    Book
  13. 13

    Computer and information security handbook

    Published 2009
    Subjects: “…Penetration testing (Computer security)…”
    Book
  14. 14

    Learn ethical hacking from scratch your stepping stone to penetration testing by Sabih, Zaid

    Published 2018
    Subjects: “…Penetration testing (Computer security)…”
    Book
  15. 15

    Metasploit bootcamp a fast-paced guide to enhance your pentesting skills by Jaswal, Nipun

    Published 2017
    Subjects: “…Penetration testing (Computer security).…”
    Book
  16. 16

    Learning Kali Linux security testing, penetration testing, and ethical hacking by Messier, Ric

    Published 2018
    Subjects: “…Penetration testing (Computer security)…”
    Book
  17. 17

    Hands-on ethical hacking and network defense by Simpson, Michael T. 1954-, Antill, Nicholas D., Wilson, Robert S.

    Published 2021
    Subjects: “…Penetration testing (Computer security)…”
    Book
  18. 18

    Software test attacks to break mobile and embedded devices by Hagar, Jon Duncan

    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Book
  19. 19

    Certified ethical hacker (CEH) version 9 cert guide by Gregg, Michael

    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Book
  20. 20

    Network scanning cookbook practical network security using Nmap and Nessus 7 by Sairam, Jetty

    Published 2018
    Subjects: “…Penetration testing (Computer security)…”
    Book