Chapter 2: Pentesting and Ethical Hacking

The following chapter discusses penetration testing, also known as pentesting. Pentesting is something that grew out of computer concerns during the 1960s. As computer systems began to distribute data more, ensuring the security of that data became crucial. After much discussion of how communication lines could be penetrated, it was recommended that some type of "penetration assessment" be used to assess computer systems and communication lines with "real threat-like" assessments. Moving forward to the early 1970s, tiger teams were created as the first penetration testing teams and carried out operations similar to the tactics you will see and read about in this book. The primary responsibility of these ...

Get AWS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.