by Milo Caranti (Author)
DescriptionThis handbook describes how to perform an intrusion test into an operating system, network or web application. Following an introduction of some essential theoretical notions, the most important tools and techniques for leading an offensive are explained in detail for every single stage of the pentest.
Topics
- Pre-engagement
- Information gathering
- Vulnerability assessment
- Exploitation
- Privilege escalation
- Post exploitation
- Reporting
- Penstesting cheatsheet
Number of Pages: 318
Dimensions: 0.67 x 9.61 x 6.69 IN
Publication Date: December 09, 2020