So far, we have acquainted ourselves with various network security concepts, cloud and wireless networks, and how to mitigate top network threats. Now, we will spend some time familiarizing ourselves with how to do a full-scale penetration testing exercise for an enterprise network, as well as the various best practices that we should follow regarding this.
In this chapter, we will take a deep dive into the practical aspects of conducting a penetration testing exercise and look at some of the tools that will come in handy for this. We will also take a look at the typical team compositions and engagement models.
The following topics will be covered in this chapter:
- Approach to network penetration ...