Chapter 12

Making Recommendations

IN THIS CHAPTER

Bullet Exploring the need for recommendations

Bullet Offering ways to shore up security

Bullet Looking at general areas of security to strengthen

Bullet Showing how to defend against attacks

Bullet Understanding and protecting vectors

In this chapter, I try to capture the most common issues you might encounter and recommendations you’ll likely want to make based on your tools. The chapter focuses on the tools, the report, the output, and your report findings and fuse those with best practices found in the industry today.

Most of what you find in this chapter (and in real life) is that most of the recommendations revolves around systems that are not up to date and need security and other forms of patching or misconfigurations that lead to security risks in your infrastructure, network, and applications.

This is your time to shine! You can highlight many of the items you will learn in your report, create a separate report or put a presentation together and/or give a ...

Get Penetration Testing For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.