Skip to Content
The Art of Network Penetration Testing
book

The Art of Network Penetration Testing

by Royce Davis
December 2020
Intermediate to advanced
304 pages
8h 57m
English
Manning Publications
Content preview from The Art of Network Penetration Testing

Phase 3. Post-exploitation and privilege escalation

Having established access into your target network environment by compromising vulnerable hosts, it’s time to reach the next level. This part of the book is all about what network attackers do after they’ve compromised a target system.

In chapter 8, you’ll learn the critical components of post-exploitation, including how to maintain reliable entry, harvest credentials, and move laterally. This chapter focuses specifically on Windows techniques. Chapter 9 covers the same post-exploitation key components but on Linux systems. You’ll learn where to search for sensitive information, including configuration files and user preferences, and also how to set up an automated reverse-shell callback job ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781617296826Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link