Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master's degree in Management of Technology at Georgia Tech.
Introduction 1
Part 1: Building the Foundation for Security Testing 5
Chapter 1: Introduction to Vulnerability and Penetration Testing 7
Chapter 2: Cracking the Hacker Mindset 25
Chapter 3: Developing Your Security Testing Plan 37
Chapter 4: Hacking Methodology 49
Part 2: Putting Security Testing in Motion 59
Chapter 5: Information Gathering 61
Chapter 6: Social Engineering 69
Chapter 7: Physical Security 87
Chapter 8: Passwords 99
Part 3: Hacking Network Hosts 129
Chapter 9: Network Infrastructure Systems 131
Chapter 10: Wireless Networks 165
Chapter 11: Mobile Devices 193
Part 4: Hacking Operating Systems 205
Chapter 12: Windows 207
Chapter 13: Linux and macOS 233
Part 5: Hacking Applications 257
Chapter 14: Communication and Messaging Systems 259
Chapter 15: Web Applications and Mobile Apps 283
Chapter 16: Databases and Storage Systems 309
Part 6: Security Testing Aftermath 321
Chapter 17: Reporting Your Results 323
Chapter 18: Plugging Your Security Holes 329
Chapter 19: Managing Security Processes 337
Part 7: The Part of Tens 345
Chapter 20: Ten Tips for Getting Security Buy-In 347
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353
Chapter 22: Ten Deadly Mistakes 357
Appendix: Tools and Resources 363
Index 379