Summary
In this chapter, we defined and discussed the legal, ethical, and software skills required when performing a penetration test. We discussed the role that various stakeholders can play at each stage of a penetration test, along with the various stages that comprise a penetration test. We explored the stages in the technical execution of a penetration test using the cyber kill chain, as well as defining the roles that various standards and legal frameworks play.
The next chapter provides a short technical introduction to programming using PowerShell. This chapter is not intended to be an introduction to PowerShell from first principles, but rather to outline the various components of PowerShell that we will be making use of in the following chapters.