null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

The Art of Network Penetration Testing (How to take over any company in the world)

List Price: $49.99
SKU:
9781617296826
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Royce Davis
    Format:
    Paperback
    Pages:
    304
    Publisher:
    Manning (December 29, 2020)
    Language:
    English
    ISBN-13:
    9781617296826
    ISBN-10:
    1617296821
    Weight:
    18.4oz
    Dimensions:
    7.375" x 9.25" x 0.6"
    File:
    Eloquence-SimonSchuster_04022026_P9912986_onix30_Complete-20260402.xml
    Folder:
    Eloquence
    List Price:
    $49.99
    Case Pack:
    26
    As low as:
    $44.99
    Publisher Identifier:
    P-SS
    Discount Code:
    G
    Pub Discount:
    37
    Imprint:
    Manning
  • Overview

    The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network.

    Summary
    Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The Art of Network Penetration Testing teaches you how to take over an enterprise network from the inside. It lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage.

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the technology
    Penetration testers uncover security gaps by attacking networks exactly like malicious intruders do. To become a world-class pentester, you need to master offensive security concepts, leverage a proven methodology, and practice, practice, practice. Th is book delivers insights from security expert Royce Davis, along with a virtual testing environment you can use to hone your skills.

    About the book
    The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords, exploit unpatched services, and elevate network level privileges, you’ll learn where the weaknesses are—and how to take advantage of them.

    What's inside

        Set up a virtual pentest lab
        Exploit Windows and Linux network vulnerabilities
        Establish persistent re-entry to compromised targets
        Detail your findings in an engagement report

    About the reader
    For tech professionals. No security experience required.

    About the author
    Royce Davis has orchestrated hundreds of penetration tests, helping to secure many of the largest companies in the world.

    Table of Contents

    1 Network Penetration Testing

    PHASE 1 - INFORMATION GATHERING

    2 Discovering network hosts

    3 Discovering network services

    4 Discovering network vulnerabilities

    PHASE 2 - FOCUSED PENETRATION

    5 Attacking vulnerable web services

    6 Attacking vulnerable database services

    7 Attacking unpatched services

    PHASE 3 - POST-EXPLOITATION AND PRIVILEGE ESCALATION

    8 Windows post-exploitation

    9 Linux or UNIX post-exploitation

    10 Controlling the entire network

    PHASE 4 - DOCUMENTATION

    11 Post-engagement cleanup

    12 Writing a solid pentest deliverable