Jump to content
Fi8sVrs

[eBook] Professional Penetration Testing

Recommended Posts

  • Active Members
Posted (edited)

Professional+Penetration+Testing+Cover.jpg?w=620

Author: Thomas Wilhelm

Table of content

Cover image
Title page
Copyright page
Preface
About the Author
About the Technical Editor
Acknowledgments
Chapter 1: Introduction
Abstract
Introduction
Summary
Chapter 2: Ethics and Hacking
Abstract
Getting Permission To Hack
Code Of Ethics Canons [(ISC)2]
Why Stay Ethical?
Ethical Standards
Computer Crime Laws
Getting Permission To Hack
Summary
Chapter 3: Setting up Your Lab
Abstract
Introduction
Summary
Chapter 4: Methodologies and Frameworks
Abstract
Introduction
Summary
Chapter 5: Pentest Project Management
Abstract
Introduction
Summary
Chapter 6: Information Gathering
Abstract
Introduction
Summary
Chapter 7: Vulnerability Identification
Abstract
Introduction
Summary
Chapter 8: Vulnerability Exploitation
Abstract
Introduction
Summary
Chapter 9: Local System Attacks
Abstract
Introduction
Summary
Chapter 10: Privilege Escalation
Abstract
Introduction
Summary
Chapter 11: Targeting Support Systems
Abstract
Introduction
Summary
Chapter 12: Targeting the Network
Abstract
Introduction
Summary
Chapter 13: Web Application Attack Techniques
Abstract
Introduction
Summary
Chapter 14: Reporting Results
Abstract
Introduction
Summary
Chapter 15: Hacking as a Career
Abstract
Introduction
Summary

Download:

http://uppit.com/79kegijxprzq/Professional_Penetration_Testing_-_Wilhelm,_Thomas.pdf

Edited by Fi8sVrs
  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...