Professional Penetration Testing
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing―the act of testing a computer network to find security vulnerabilities before they are maliciously exploited―is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.
Companion videos and notes
Chapter 2 - Ethics and Hacking 1 video
Chapter 4 - Setting Up Your Labs 4 videos
Chapter 5 - The Cyber Kill Chain 1 video · 1 post
- Picking a Pentest Methodology Jul 2024
Chapter 6 - Reconnaissance 5 videos
Chapter 7 - Weaponization 2 videos
Chapter 9 - Exploitation 2 videos
Chapter 11 - Command and Control 1 video
Chapter 12 - Actions on Objectives 1 video
Chapter 14 - Web Application Attack Techniques 6 videos
★ Members
11:02
Hacking websites with ID and Authentication Failures
★ Members
8:20
Command Injection Explained: Turn User Input Into Server Commands
★ Members
8:05
Access Control Failures: How Attackers Grab Other Users’ Data
★ Members
8:04
Crypto Mistakes That Leak Secrets
★ Members
8:02
Server Side Request Forgery: Pivot From a URL Field to Internal Systems
★ Members
11:58