Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Penetration Testing Bootcamp

You're reading from   Penetration Testing Bootcamp Quickly get up and running with pentesting techniques

Arrow left icon
Product type Paperback
Published in Jun 2017
Publisher Packt
ISBN-13 9781787288744
Length 258 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Jason Beltrame Jason Beltrame
Author Profile Icon Jason Beltrame
Jason Beltrame
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Planning and Preparation 2. Information Gathering FREE CHAPTER 3. Setting up and maintaining the Command and Control Server 4. Vulnerability Scanning and Metasploit 5. Traffic Sniffing and Spoofing 6. Password-based Attacks 7. Attacks on the Network Infrastructure 8. Web Application Attacks 9. Cleaning Up and Getting Out 10. Writing Up the Penetration Testing Report

Gathering all your data

Now that all the tests have been performed and evidence has been collected, it is time to gather all of our data. Hopefully, you have been keeping it well organized on your C&C server, as that will make the entire process much easier. Typically, I start the entire process by breaking down the data into three parts. This will start the process of getting me to that final structure that will allow me to turn all that data into the finalized product.

Here are the first three categories I break the information down into:

  • Reports
  • Diagrams
  • Vulnerability/findings information

I then take the vulnerability evidence that contains screenshots, scripts, and notes and move them into their respective vulnerabilities, sorted by the vulnerability. This allows for an easier migration to writing.

For example, looking back on the Chapter 8, Web Application Attacks,...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime