
Professional Penetration Testing
Creating and Learning in a Hacking Lab
- 3rd Edition - January 21, 2025
- Imprint: Syngress
- Author: Thomas Wilhelm
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 2 6 4 7 8 - 8
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 2 6 4 7 9 - 5
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetr… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteHere, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
- Helps users find out how to turn hacking and pen testing skills into a professional career
- Covers how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
- Presents metrics and reporting methodologies that provide experience crucial to a professional penetration tester
- Includes test lab code that is available on the web
- Title of Book
- Cover image
- Title page
- Table of Contents
- Copyright
- About the author
- About the technical editor
- Preface
- Acknowledgments
- Chapter 1. Introduction
- Abstract
- Table of Contents
- Introduction
- About this edition
- Online supporting materials
- About the author
- Summary
- Chapter 2. Ethics and hacking
- Abstract
- Table of Contents
- Introduction
- Getting permission to hack
- Code of Ethics Canons—ISC2
- Why stay ethical?
- Ethical standards
- Computer crime laws
- Contractual agreements
- Summary
- References
- Chapter 3. Picking your pentesting focus
- Abstract
- Table of Contents
- Introduction
- Hacking domains
- Code penetration testing
- Fuzz testing
- Injection testing
- Authentication and authorization testing
- Session management testing
- Data validation testing
- Cryptographic testing
- Error handling and logging testing
- Mobile application testing
- Internet of Things application testing
- Code review
- Reverse engineering
- Network penetration testing
- Cloud penetration testing
- Red Team assessments
- Physical penetration testing
- Social engineering
- Security personnel and guard response
- Summary
- Chapter 4. Setting up your labs
- Abstract
- Table of Contents
- Introduction
- Targets in a pentest lab
- Virtual network pentest labs
- Virtualization engine lab
- Docker pentest lab
- Cloud-based pentest lab
- Advanced hardware-based pentest lab
- Summary
- Chapter 5. The Cyber Kill Chain
- Abstract
- Table of Contents
- Introduction
- Definitions
- Methodology
- Framework
- Playbooks
- Cyber Kill Chain methodology
- Security team responses
- Management of a pentest
- Project Management Body of Knowledge
- Project team members
- Project management
- Solo pentesting
- Archiving data
- Creating and using system images
- Change management controls
- Planning for your next pentest
- Risk management register
- Knowledge database
- Summary
- References
- Chapter 6. Reconnaissance
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Intelligence Gathering
- Footprinting
- Vulnerability analysis
- Summary
- Chapter 7. Weaponization
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Metasploit Framework
- Summary
- Chapter 8. Delivery
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Summary
- Reference
- Chapter 9. Exploitation
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Vulnerabilities
- Summary
- Chapter 10. Installation
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Persistent access
- Summary
- Chapter 11. Command and Control
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- Command line
- Meterpreter
- Local password attacks
- Summary
- Chapter 12. Actions on Objectives
- Abstract
- Table of Contents
- Introduction
- Mapping framework to methodology
- High value/profile targets
- Data exfiltration
- Artificial intelligence
- Summary
- Reference
- Chapter 13. Targeting the network
- Abstract
- Table of Contents
- Introduction
- Wireless network protocols
- Simple Network Management Protocol
- Networking attacks
- Summary
- Chapter 14. Web application attack techniques
- Abstract
- Table of Contents
- Introduction
- Burp Suite
- OWASP
- OWASP Top 10
- Summary
- Chapter 15. Cloud testing
- Abstract
- Table of Contents
- Introduction
- Cloud pentesting labs
- Cloud security review
- Cloud pentest
- Summary
- Chapter 16. Reporting results
- Abstract
- Content
- Introduction
- What should you report?
- Manuscript preparation
- Appendices
- Common Vulnerabilities and Exposures
- National Vulnerability Database
- Vulnerability scanners
- Reporting software
- Final report
- Summary
- Chapter 17. Hacking as a career
- Abstract
- Table of Contents
- Introduction
- Career paths
- Associations and organizations
- Putting it all together
- Summary
- Index
- Edition: 3
- Published: January 21, 2025
- Imprint: Syngress
- No. of pages: 540
- Language: English
- Paperback ISBN: 9780443264788
- eBook ISBN: 9780443264795
TW
Thomas Wilhelm
Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.
Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master’s degrees in both Computer Science and Management.
His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.