Introduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 rueFalseFalseTrue[FileName][path.GetFileNameWithoutExtension(item)][ISBN_Number][FileName.Split("."c)(0)]TrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueTrueFalseTrueSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.
ExpressionsSystem.Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.
GenericSystem.DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.AutomationSystem.Net.
MailSystem.XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.
DataSystemSystem.CoreSystem.Management.AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.
XamlTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalse[det]TrueFalseTrueFalseFalseTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueFalseFalseFalseFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseTrueTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseFalseTrueFalseTrueFalseFalseFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueTrueFalseSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.ExpressionsSystem.Activities.ValidationSystem.
Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.GenericSystem.DataSystem.DiagnosticsSystem.
IOSystem.LinqSystem.Management.AutomationSystem.Net.MailSystem.XmlSystem.Xml.
LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.CoreSystem.Management.
AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlFalseFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalse0-7645-5985-0/978-0-7645-5985-3 (Paper)0-470-22213-1/978-0-470-22213-3 (E-books - MobiPocket)0-471-75096-4/978-0-471-75096-3 (E-books - Adobe PDF)1-118-05418-0/978-1-118-05418-5 (E-books - ePub)TrueFalseSystem.ActivitiesSystem.Activities.
StatementsSystem.Activities.ExpressionsSystem.Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.
ActivitiesSystemSystem.Collections.GenericSystem.DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.
AutomationSystem.Net.MailSystem.XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.
MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.CoreSystem.Management.AutomationSystem.XmlSystem.Xml.
LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueFalseFalseFalseFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseTrueTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseFalseTrueFalseTrueFalseFalseFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueTrueFalseSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.ExpressionsSystem.
Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.GenericSystem.
DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.AutomationSystem.Net.MailSystem.
XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.
CoreSystem.Management.AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlFalseFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseFalseTrueFalseTruentroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 ntroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 ntroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363