menu
{ "item_title" : "Guide to Pentesting", "item_author" : [" Milo Caranti "], "item_description" : "DescriptionThis handbook describes how to perform an intrusion test into an operating system, network or web application. Following an introduction of some essential theoretical notions, the most important tools and techniques for leading an offensive are explained in detail for every single stage of the pentest. Who is this book for?For those who want to know more about applied Cyber security, have basic computer skills and are intrigued by the potential of Unix-like universe. The paper can also be useful for the professional pentester, who will have some samples of typical scenarios and attacks that can be quickly accessed. TopicsPre-engagementInformation gatheringVulnerability assessmentExploitationPrivilege escalationPost exploitationReportingPenstesting cheatsheet", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/9/79/857/291/9798572910551_b.jpg", "price_data" : { "retail_price" : "18.00", "online_price" : "18.00", "our_price" : "18.00", "club_price" : "18.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Guide to Pentesting|Milo Caranti

Guide to Pentesting : English edition 2020

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Description
This handbook describes how to perform an intrusion test into an operating system, network or web application. Following an introduction of some essential theoretical notions, the most important tools and techniques for leading an offensive are explained in detail for every single stage of the pentest. Who is this book for?
For those who want to know more about applied Cyber security, have basic computer skills and are intrigued by the potential of Unix-like universe. The paper can also be useful for the professional pentester, who will have some samples of typical scenarios and attacks that can be quickly accessed. Topics

  • Pre-engagement
  • Information gathering
  • Vulnerability assessment
  • Exploitation
  • Privilege escalation
  • Post exploitation
  • Reporting
  • Penstesting cheatsheet

This item is Non-Returnable

Details

  • ISBN-13: 9798572910551
  • ISBN-10: 9798572910551
  • Publisher: Independently Published
  • Publish Date: December 2020
  • Dimensions: 9.61 x 6.69 x 0.67 inches
  • Shipping Weight: 1.12 pounds
  • Page Count: 318

Related Categories

You May Also Like...

    1

BAM Customer Reviews