I need a literature review on Penetration testing including the topics given below and plagiarism less than 10%.
Sources can be any. Given below are the topics and respective sources recommended to use.
General pentesting
——————
– Ethical Hacking and Penetration Testing Guide, By Rafay Baloch
– Improving your Penetration Testing Skills, By Gilberto
Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira and Abhinav
Singh
– Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and
Metasploit, By Sagar Rahalkar
Metasploit specific pentesting
——————————
– Metasploit Penetration Testing Cookbook – Third Edition, By Daniel
Teixeira, Abhinav Singh and Monika Agarwal
Kali linux specific pentesting
——————————
– Kali Linux 2018: Assuring Security by Penetration Testing – Fourth
Edition, By Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard
Johansen, Lee Allen, Tedi Heriyanto and Shakeel Ali
– Kali Linux Wireless Penetration Testing Cookbook, By Sean-Philip
Oriyano
Web specific pentesting
———————–
– Mastering Modern Web Penetration Testing, By Prakhar Prasad
– Hands-On Web Penetration Testing with Metasploit, By Harpreet Singh
and Himanshu Sharma
– Practical Web Penetration Testing, By Gus Khawaja
– Hands-On Application Penetration Testing with Burp Suite, By Carlos
A. Lozano, Dhruv Shah and Riyaz Ahemed Walikar
Windows specific pentesting
—————————
– Hands-On Penetration Testing on Windows, By Phil Bramwell
Incident response and analysis
——————————
– Digital Forensics and Incident Response – Second Edition, By Gerard
Johansen
– Cybersecurity Incident Response: How to Contain, Eradicate, and
Recover from Incidents, By Eric C. Thompson
– Hands-on Incident Response and Digital Forensics, By Mike Sheward
– Incident Response & Computer Forensics, Third Edition, 3rd Edition,
By Jason Luttgens, Matthew Pepe and Kevin Mandia
– Network Forensics, By Ric Messier
– Google Rapid Response: https://grr-doc.readthedocs.io/en/v3.4.0/what-is-grr.html
Memory analysis
—————
– Volatility framework: https://volatility3.readthedocs.io/en/latest/
– The Art of Memory Forensics: Detecting Malware and Threats in
Windows, Linux, and Mac Memory, By AAron Walters, Jamie Levy, Andrew
Case and Michael Hale Ligh
Intrusion detection and prevention
———————————-
– Snort: https://www.snort.org/documents
– Zeek (formerly Bro): https://docs.zeek.org/en/current/
– OSSEC: https://www.ossec.net/docs/docs/manual/index.html
Network packet analysis
———————-
– Practical Packet Analysis, 3rd Edition, By Chris Sanders
– Packet Analysis with Wireshark, By Anish Nath
– Network Forensics, By Ric Messier
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more