Firstly, I would personally like to say congratulations on completing this book! You have acquired some amazing skills in cybersecurity, particularly in the field of penetration testing, using one of the most popular penetrating testing Linux distributions available: Kali Linux. During the course of this title, we focused a lot on the technicalities and practical aspects of becoming a penetration tester/ethical hacker.
However, there are still the best practices of penetration testing left to cover. Learning about best practices will help you improve yourself as a professional in the business world. By following recommended procedures, you'll be able to work effectively and obtain optimal results in an efficient manner.
In this chapter, we will cover the following topics:
- Guidelines for penetration testers
- Web application security blueprints and checklists...