Summary
It is critical that security is considered during the entire lifecycle of any resources that are important to business operations. Our goal for writing this book beyond supporting a Penetration Tester is educating readers on various methods; malicious users can compromise a resource, so administrators can improve their security defenses. Everybody is a target, and it is up to the asset owner to invest the proper time and resources into reducing the risk of being compromised.
This chapter serves as a means to defend against attacks presented in previous chapters. It should be assumed that tools used in previous chapters could be leveraged to verify vulnerabilities on your own systems. Topics covered in this chapter included how to clone a web application to avoid testing live systems, baseline security standards, and defending against topics from previous chapters. Those topics include passwords, man-in-the-middle attacks, SSL striping, DoS, stealing cookies, and clickjacking. This...