Ethical Hacking: The Value of Controlled Penetration Tests E-Book- Free Download-
E book content:
Ethical Hacking – Benefits
Ethical Hacking – Rationale
Penetration Testing – General
Penetration Testing – Internal
Penetration Testing – Tool
Penetration Testing – The Process
Gathering Information
Scanning IP Addresses
Determining Service Versions
Vulnerability Assessment Tools
Assembling The Target List
Gathering and Testing Exploits
Running Exploits Against Live Targets
Interactive Access on Host(s)
Example Penetrations