Chapter 10: Protecting the Pen Tester

Pen testers must be concerned about the security of their own machines, especially those machines that contain sensitive client information, passwords, reports, and things along those lines. Pen testers are a prime target for adversaries. I know multiple pen testers that have been targeted and compromised by real-world adversaries, and that is not fun.

Hence, be aware of the importance of protecting pen test assets. Depending on what you are working on, the stakes could be high.

This and the following chapters will highlight a few custom and off-the-shelf tools and techniques that you can employ to gain better insights and protection, or at least hopefully steer some discussions to implement improvements. ...

Get Cybersecurity Attacks – Red Team Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.