Introduction |
|
1 | (1) |
About This Book |
|
1 | (1) |
Foolish Assumptions |
|
2 | (1) |
Icons Used in This Book |
|
2 | (1) |
What You're Not to Read |
|
3 | (1) |
Where to Go from Here |
|
3 | (2) |
|
PART 1 GETTING STARTED WITH PEN TESTING |
|
|
5 | (46) |
|
Chapter 1 Understanding the Role Pen Testers Play in Security |
|
|
7 | (16) |
|
Looking at Pen Testing Roles |
|
|
8 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Gaining the Basic Skills to Pen Test |
|
|
10 | (6) |
|
|
12 | (2) |
|
General security technology |
|
|
14 | (1) |
|
Systems infrastructure and applications |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (2) |
|
What You Need to Get Started |
|
|
18 | (1) |
|
Deciding How and When to Pen Test |
|
|
19 | (2) |
|
|
21 | (2) |
|
Chapter 2 An Overview Look at Pen Testing |
|
|
23 | (16) |
|
|
23 | (8) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (4) |
|
Exclusions and ping sweeps |
|
|
31 | (1) |
|
|
32 | (1) |
|
Antivirus and other technologies |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
Doing Active Reconnaissance: How Hackers Gather Intelligence |
|
|
37 | (2) |
|
Chapter 3 Gathering Your Tools |
|
|
39 | (12) |
|
Considerations for Your Toolkit |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
43 | (3) |
|
|
46 | (3) |
|
|
49 | (2) |
|
PART 2 UNDERSTANDING THE DIFFERENT TYPES OF PEN TESTING |
|
|
51 | (64) |
|
Chapter 4 Penetrate and Exploit |
|
|
53 | (16) |
|
Understanding Vectors and the Art of Hacking |
|
|
54 | (1) |
|
Examining Types of Penetration Attacks |
|
|
55 | (8) |
|
|
55 | (5) |
|
Client-side and server-side attacks |
|
|
60 | (2) |
|
|
62 | (1) |
|
Cryptology and Encryption |
|
|
63 | (2) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Using Metasploit Framework and Pro |
|
|
65 | (4) |
|
Chapter 5 Assumption (Man in the Middle) |
|
|
69 | (10) |
|
|
70 | (4) |
|
|
70 | (2) |
|
|
72 | (2) |
|
Listening In to Collect Data |
|
|
74 | (5) |
|
|
74 | (1) |
|
|
75 | (2) |
|
Packet capture and analysis |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Chapter 6 Overwhelm and Disrupt (DoS/DDoS) |
|
|
79 | (14) |
|
|
80 | (4) |
|
|
80 | (3) |
|
Kali T50 Mixed Packet Injector tool |
|
|
83 | (1) |
|
Understanding Denial of Service (DoS) Attacks |
|
|
84 | (2) |
|
|
86 | (2) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
Chapter 7 Destroy (Malware) |
|
|
93 | (10) |
|
|
94 | (3) |
|
Antivirus software and other tools |
|
|
94 | (1) |
|
|
94 | (3) |
|
|
97 | (2) |
|
|
99 | (2) |
|
Other Types of Destroy Attacks |
|
|
101 | (2) |
|
Chapter 8 Subvert (Controls Bypass) |
|
|
103 | (12) |
|
|
103 | (6) |
|
Antivirus software and other tools |
|
|
104 | (1) |
|
|
104 | (5) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (3) |
|
Using malware to find a way in |
|
|
112 | (1) |
|
|
113 | (2) |
|
PART 3 DIVING IN: PREPARATIONS AND TESTING |
|
|
115 | (32) |
|
Chapter 9 Preparing for the Pen Test |
|
|
111 | (18) |
|
Handling the Preliminary Logistics |
|
|
117 | (4) |
|
Holding an initial meeting |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (3) |
|
Reviewing past test results |
|
|
122 | (1) |
|
Consulting the risk register |
|
|
122 | (2) |
|
|
124 | (3) |
|
Selecting a project or scan type |
|
|
125 | (1) |
|
|
125 | (2) |
|
|
127 | (2) |
|
Chapter 10 Conducting a Penetration Test |
|
|
129 | (18) |
|
|
130 | (6) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Exfiltration (and success) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Looking at the Pen Test from Inside |
|
|
136 | (1) |
|
Documenting Your Every Move |
|
|
136 | (3) |
|
|
137 | (1) |
|
Updating the risk register |
|
|
138 | (1) |
|
|
138 | (1) |
|
Other Capture Methods and Vectors |
|
|
139 | (1) |
|
|
139 | (3) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (5) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Devising best practices from lessons learned |
|
|
143 | (4) |
|
PART 4 CREATING A PEN TEST REPORT |
|
|
147 | (44) |
|
|
149 | (12) |
|
Structuring the Pen Test Report |
|
|
150 | (6) |
|
|
150 | (2) |
|
Tools, Methods, and Vectors |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Creating a Professional and Accurate Report |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
Encourage staff awareness and training |
|
|
157 | (1) |
|
Delivering the Report: Report Out Fundamentals |
|
|
157 | (1) |
|
Updating the Risk Register |
|
|
158 | (3) |
|
Chapter 12 Making Recommendations |
|
|
161 | (20) |
|
Understanding Why Recommendations Are Necessary |
|
|
162 | (1) |
|
Seeing How Assessments Fit into Recommendations |
|
|
162 | (3) |
|
|
165 | (3) |
|
General network hardening |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (5) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
General Security Recommendations: All Systems |
|
|
173 | (4) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (4) |
|
Segmentation and virtualization |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Awareness and social engineering |
|
|
179 | (2) |
|
|
181 | (10) |
|
Looking at the Benefits of Retesting |
|
|
182 | (1) |
|
Understanding the Reiterative Nature of Pen Testing and Retesting |
|
|
183 | (1) |
|
Determining When to Retest |
|
|
184 | (1) |
|
|
185 | (4) |
|
Consulting your documentation |
|
|
185 | (2) |
|
|
187 | (1) |
|
Reviewing the risk register |
|
|
188 | (1) |
|
|
189 | (2) |
|
|
191 | (26) |
|
Chapter 14 Top Ten Myths About Pen Testing |
|
|
193 | (8) |
|
All Forms of Ethical Hacking Are the Same |
|
|
194 | (1) |
|
We Can't Afford a Pen Tester |
|
|
194 | (1) |
|
We Can't Trust a Pen Tester |
|
|
195 | (1) |
|
|
196 | (1) |
|
Pen Tests Are Not Done Often |
|
|
197 | (1) |
|
Pen Tests Are Only for Technical Systems |
|
|
198 | (1) |
|
Contractors Can't Make Great Pen Testers |
|
|
199 | (1) |
|
Pen Test Tool Kits Must Be Standardized |
|
|
199 | (1) |
|
Pen Testing Itself Is a Myth and Unneeded |
|
|
200 | (1) |
|
Pen Testers Know Enough and Don't Need to Continue to Learn |
|
|
200 | (1) |
|
Chapter 15 Ten Tips to Refine Your Pen Testing Skills |
|
|
201 | (8) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (1) |
|
Stay Ahead of New Technologies |
|
|
207 | (1) |
|
|
207 | (1) |
|
Learn about Physical Security |
|
|
208 | (1) |
|
Chapter 16 Ten Sites to Learn More About Pen Testing |
|
|
209 | (8) |
|
|
210 | (1) |
|
|
211 | (1) |
|
Software Engineering Institute |
|
|
211 | (1) |
|
(Assorted) Legal Penetration Sites |
|
|
212 | (1) |
|
Open Web Application Security Project |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (2) |
Index |
|
217 | |