-
Book Overview & Buying
-
Table Of Contents
Advanced Penetration Testing for Highly-Secured Environments, Second Edition - Second Edition
By :
Hopefully, you have been able to complete your testing before reading this portion of the chapter. It will contain examples and at least one method for an initial approach to breach the security of the virtual AspenMLC Development Lab running on our own network or machine. If your documentation or methodology to obtain the initial goal is different, than that is described within; it does not mean it is wrong, just different. With practice, penetration testers will develop their own methods, are tailored to their skill set and knowledge base.
There may be other methods to reach our goal than those described in this chapter. If you find other methods of compromising machines in the site network, congratulations are due! That is what penetration testing is all about.
The scope of this particular test can be clearly defined by reading the scenario objective and background information:
We have 4 hours to test a virtual environment that has been made to emulate...
Change the font size
Change margin width
Change background colour