Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
What You Will Learn
- Identify security vulnerabilities
- Use some of the top security tools to identify holes
- Read reports from testing tools
- Spot and negate common attacks
- Identify common Web-based attacks and exposures as well as recommendations for closing those holes
Who This Book Is For
Anyone who has some familiarity with computers and an interest in information security and penetration testing.
1. What Is Penetration Testing?
Information Security
Penetration Testing vs Security Assessments
Who does Penetration Testing
2. Digging for Information
Google Hacking
Social Networking
Job Sites
Technical sources (e.g., regional Internet registries)
lóå