CHAPTER 7

Danger! Danger! Danger! (Penetration Testing)

How do you stop attackers from getting into your network? Of course, there are many ways to protect your assets; we have already discussed a number of them. But, the security provided by a firewall, WiFi encryption, or any other protection, including passwords, is only as good as the implementation. Given the complexities of setting up security solutions properly, penetration testing is required. Penetration testing, also called pentesting in the security world, involves using the same tools an attacker would use to get into the network illicitly to find the holes in a system.

Professional penetration testers, sometimes called white-hat hackers, are professionals who try to breach defenses ...

Get Information Technology Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.