Please share your thoughts on this book with others by leaving a review on the site that you bought it from. If you purchased the book from Amazon, please leave us an honest review on this book's Amazon page. This is vital so that other potential readers can see and use your unbiased opinion to make purchasing decisions, we can understand what our customers think about our products, and our authors can see your feedback on the title that they have worked with Packt to create. It will only take a few minutes of your time, but is valuable to other potential customers, our authors, and Packt. Thank you!
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Learn Penetration Testing
By :

Learn Penetration Testing
By:
Overview of this book
Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.
You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats. The book will even help you leverage the best tools, such as Kali Linux, Metasploit, Burp Suite, and other open source pentesting tools to perform these techniques. Toward the later chapters, you'll focus on best practices to quickly resolve security threats.
By the end of this book, you'll be well versed with various penetration testing techniques so as to be able to tackle security threats effectively
Table of Contents (21 chapters)
Preface
Introduction to Penetration Testing
Getting Started with Kali Linux
Section 2: Exploitation
Performing Information Gathering
Mastering Social Engineering
Diving into the Metasploit Framework
Understanding Password Attacks
Working with Burp Suite
Attacking Web Applications
Getting Started with Wireless Attacks
Section 3: Post Exploitation
Moving Laterally and Escalating Your Privileges
Antivirus Evasion
Maintaining Control within the Environment
Section 4: Putting It All Together
Reporting and Acting on Your Findings
Where Do I Go from Here?
Assessments
Other Books You May Enjoy
Customer Reviews