Nicht aus der Schweiz? Besuchen Sie lehmanns.de
From Hacking to Report Writing - Robert Svensson

From Hacking to Report Writing (eBook)

An Introduction to Security and Penetration Testing

(Autor)

eBook Download: PDF
2016 | 1st ed.
XXII, 190 Seiten
Apress (Verlag)
978-1-4842-2283-6 (ISBN)
Systemvoraussetzungen
56,99 inkl. MwSt
(CHF 55,65)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book will teach you everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.

Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.

Embedded in the book are a number of on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.

We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.

What you'll learn

  • Clearly understand why security and penetration testing is important.
  • How to find vulnerabilities in any system using the same techniques as hackers do.
  • Write professional looking reports.
  • Know which security and penetration testing method to apply for any given situation.
  • How to successfully hold together a security and penetration test project.

Who This Book Is For

Aspiring security and penetration testers, Security consultants, Security and penetration testers, IT managers, and Security researchers.



Robert Svensson has had pretty much every IT job one can imagine: he's been yelled at over the phone taking support calls, he's done IT security incident management for multi-nationals, he's worked with startups, he's programmed and so on... but over the last ten years or so IT security has been his sole focus. In his case, that means he's done countless penetration tests, written numerous reports and somehow managed to get rehired to do it all over again. And yeah, he fell in love with computers the second he unwrapped the commodore 64 he got for Christmas about a million years ago-it all started there.

One of Robert's goals in writing this book is to put out the book he wish he had read when he first started doing penetration tests-a book that also clearly explains why security testing is important, not just how it's done. However, the number one reason why he's writing this book is simple: passion. He loves security and learning as much about it as he possibly can. And having worked as a teacher, he knows no better way to learn than to teach.


Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.Embedded in the book are a number of on-the-job stories that will give you a good understandingof how you can apply what you have learned to real-world situations. We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.What you ll learnClearly understand why security and penetration testing is importantFind vulnerabilities in any system using the same techniques as hackers doWrite professional looking reportsKnow which security and penetration testing method to apply for any given situationSuccessfully hold together a security and penetration test projectWho This Book Is ForAspiring security and penetration testers, security consultants, security and penetration testers, IT managers, andsecurity researchers.

Robert Svensson has had pretty much every IT job one can imagine: he’s been yelled at over the phone taking support calls, he’s done IT security incident management for multi-nationals, he’s worked with startups, he’s programmed and so on… but over the last ten years or so IT security has been his sole focus. In his case, that means he’s done countless penetration tests, written numerous reports and somehow managed to get rehired to do it all over again. And yeah, he fell in love with computers the second he unwrapped the commodore 64 he got for Christmas about a million years ago—it all started there. One of Robert’s goals in writing this book is to put out the book he wish he had read when he first started doing penetration tests—a book that also clearly explains why security testing is important, not just how it’s done. However, the number one reason why he’s writing this book is simple: passion. He loves security and learning as much about it as he possibly can. And having worked as a teacher, he knows no better way to learn than to teach.

Chapter 1: Introduction.- Chapter 2: Security Testing Basics.- Chapter 3: The Security Testing Process.- Chapter 4: Technical Preparations.- Chapter 5: Security Test Execution.- Chapter 6: Identifying Vulnerabilities.- Chapter 7: Exploiting Vulnerabilities.- Chapter 8: Reporting Vulnerabilities.- Chapter 9: Example Reports.- Chapter 10: 10 Tips to Become a Better Security Tester.

Erscheint lt. Verlag 4.11.2016
Zusatzinfo XXII, 190 p. 79 illus., 53 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Attack vectors • footprinting • Hacking • IT Security • Metasploit • Nmap • OWASP attacks • Penetration Testing • Pen-Testing • Report Writing • Scanning • security testing • Security tools • Software exploitation • System vulnerabilities • vulnerability • White/Grey/Black box testing
ISBN-10 1-4842-2283-0 / 1484222830
ISBN-13 978-1-4842-2283-6 / 9781484222836
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 12,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95