Introduction 1Pre-Assessment 7Part 1: Planning and Information Gathering 13Chapter 1: Introduction to Penetration Testing 15Chapter 2: Planning and Scoping 39Chapter 3: Information Gathering 69Chapter 4: Vulnerability Identification 109Part 2: Attacks and Exploits 153Chapter 5: Exploiting Systems 155Chapter 6: Exploiting Wireless Vulnerabilities 209Chapter 7: Exploiting Application-Based Vulnerabilities 247Part 3: Post-Exploitation and Reporting 293Chapter 8: Understanding Post-Exploitation Actions 295Chapter 9: Common Penetration Testing Tools 333Chapter 10: Analyzing Script Functionality 385Chapter 11: Reporting and Communication 429Part 4: Appendixes 455Appendix A: PenTest+ Exam Details 457Appendix B: CompTIA PenTest+ Exam Reference Matrix 465Appendix C: Lab Setup 489Index 493
Glen E. Clarke is the owner of DC Advanced Technology Training (DCATT) and teaches dozens of courses on cybersecurity, Microsoft software, and programming. Glen has authored many certification titles on topics such as A+, Network+, Security+, Cisco CCT and CCNA.