Pregame : the setup -- Building your penetration testing box -- Before the snap : scanning the network -- The drive : exploiting scanner findings -- The throw : manual web application findings -- The lateral pass : moving through the network -- The screen : social engineering -- The onside kick : attacks that require physical access -- The quarterback sneak : evading AV -- Special teams : cracking, exploits, tricks -- Two-minute drill - from zero to hero -- Post game analysis : reporting -- Continuing education -- Final notes.
0
TOPICAL NAME USED AS SUBJECT
Computer crimes-- Prevention.
Computer networks-- Security measures.
Computer programming.
Computer software-- Testing.
Hackers.
Penetration testing (Computer security), Handbooks, manuals, etc.