ABSTRACT

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.

chapter 1|6 pages

Getting Started

chapter 2|30 pages

Setting the Stage

chapter 3|8 pages

The Framework

chapter 4|24 pages

Information Security Models

chapter 5|24 pages

Scope of Information Security Programs

chapter 6|22 pages

Business Objectives

chapter 7|50 pages

Inherent Limitations

chapter 8|18 pages

Technical Preparation

chapter 9|30 pages

Reconnaissance

chapter 10|10 pages

Enumeration

chapter 11|12 pages

Vulnerability Analysis

chapter 12|26 pages

Exploitation

chapter 13|24 pages

The Deliverable

chapter 14|28 pages

Integrating the Results