: This article mainly introduces a good book recommendation: Hacker tips: Practical Guide to penetration testing. For more information about PHP tutorials, see. Introduction
Penetration testing uses various vulnerability scanning tools to evaluate network security by simulating hacker attack methods.
This book uses a large number of real cases and philatelic help suggestions to explain some of the obstacles that will be faced during the penetration test and the corresponding solutions. This book is divided into 10 chapters, covering the installation and configuration of attacking machines/tools involved in this book, network scanning, vulnerability exploitation, and manual searching for Web application vulnerabilities, knowledge about how to obtain more important information, social engineering skills, physical access attacks, anti-virus software methods, password cracking tips, and final results after attacking the system.
This book is well-organized and its chapters are directly independent of each other. readers can read as needed or chapter by chapter. This book does not require readers to have a background in penetration testing, but it is helpful to understand the content of this book if they have relevant experience.
Author profile
Peter Kim, CEO and chairman of Secure Planet, has nearly 10 years of experience in the security field and has been engaged in penetration testing for the past seven years. He has taught penetration testing and network security courses at Howard Community College in Maryland and has a large number of security-related certifications.
Recommendation Index
Amazon, the most well-known penetration testing book in the market, ranks first in the United States for a long time and is well received. its English version of paper books sold 17000 million books within one year, and its electronic version sold 7500 copies, sales Spike all other similar penetration test books.
Spoiler: Rugby
The book describes the tactics of penetration testing based on the voice of rugby. the content of the book is as follows:
1. preparations before the competition-installation: about how to configure the attack machines and tools used in this book. 2. before serving-scan the network: Before you start, you need to scan to understand the environment you are about to face. This chapter will explore more about target information and intelligent scanning. 3. flat-vulnerability exploitation: uses the vulnerabilities found in the scan to attack the system. From now on, we have taken action. 4. Transfer-artificial detection technology for Web applications: sometimes, you need to make full use of your ideas to find open targets. We will look at how to manually find and attack Web applications. 5. Cross-pass-penetration over the intranet: how to obtain more important information through the network after a system is attacked. 6. assist-social engineering: puzzles the enemy through performances. This chapter will explain some social engineering skills. 7. short pass-attacks requiring physical access: a pretty short kick that requires a very close distance. This section describes the attacks that require physical access. 8. split-guard breakthrough-avoids anti-virus detection: when you are very close to each other, the attack is awesome. In most cases, you may face obstruction from anti-virus software. To solve this problem, this chapter describes how to avoid the virus. 9. special team-cracking, exploitation, and skills: cracking passwords, exploiting vulnerabilities, and some tips. 10. post-game analysis report: competition process analysis and result report. 11. Continuing Education: share with readers some things necessary to improve the penetration test level, such as attending security meetings, attending training courses, reading related books, studying vulnerability frameworks, and participating in CTF competitions.
The above introduces a good book recommendation: Hacker tips: Practical Guide to penetration testing, including some content, and hope to be helpful to friends who are interested in PHP tutorials.