,The Art of Network
Penetration Testing
, contents
preface ix
acknowledgments xiii
about this book xiii
about the author xvi
about the cover illustration xvi
1 Network penetration testing 1
1.1 Corporate data breaches 2
, 1.2 How hackers break in 3
The defender role 3 The attacker role
■
3
1.3 Adversarial attack simulation: Penetration testing 4 Typical
INPT workflow 5
1.4 When a penetration test is least effective 6
Low-hanging fruit 6 ■
When does a company really need a
penetration test? 7
1.5 Executing a network penetration test 8
Phase 1: Information gathering 8 Phase 2: Focused
■
penetration 9 Phase 3: Post-exploitation and privilege escalation
■
10 Phase 4: Documentation 11
■
1.6 Setting up your lab environment 12
The Capsulecorp Pentest project 13
iii
Penetration Testing
, contents
preface ix
acknowledgments xiii
about this book xiii
about the author xvi
about the cover illustration xvi
1 Network penetration testing 1
1.1 Corporate data breaches 2
, 1.2 How hackers break in 3
The defender role 3 The attacker role
■
3
1.3 Adversarial attack simulation: Penetration testing 4 Typical
INPT workflow 5
1.4 When a penetration test is least effective 6
Low-hanging fruit 6 ■
When does a company really need a
penetration test? 7
1.5 Executing a network penetration test 8
Phase 1: Information gathering 8 Phase 2: Focused
■
penetration 9 Phase 3: Post-exploitation and privilege escalation
■
10 Phase 4: Documentation 11
■
1.6 Setting up your lab environment 12
The Capsulecorp Pentest project 13
iii