Dear PenTest Readers!
We are pleased to present you the newest issue of PenTest Magazine. In the March issue, we have decided to focus on various important aspects of penetration testing. The first section is devoted to Social Engineering. Here you will find four interesting articles, such as Lurking in the Shadows of the Social Web by Chris Schmidt, Social Engineering for Pen Testers by Dominique Righetto, Information Security Policy (ISMS) by Prashant Mishra and Physical Penetration Testing via Social Engineering by Ayan Kumar Pan. In short, thanks to reading this chapter you will learn the basic history of social engineering, how to build the attack profile and understand the necessity of establishing Security Policy in your Company. The next section of the newest issue is entitled Network. Here, Amar Wakharkar will talk about Grey Hat Hacking and will explore Oracle and SQL Enumeration and Exploitation as well as Exploiting Anti Virus Services. The next article, Network Mapper a Powerful Tool by Amar Wakharkar will explain you why Nmap is the most powerful tool in the field of pentesting. Furthermore, Rob Sloan, the author of Network Monitoring will explain you the Threat Triangle. In the following section, that is Reporting you will find an article entitled Running Head Penetration Test Results Reporting by Terrance Stachowski whom you already know from the cover of this issue. We would like to encourage you to take a look at Tips & Tricks section where Domagoj Vrataric will teach you how to how to transform Nexus 7 into penetration testing platform. What is more, Brian Evans will try to answer the common question: why are organizations failing to comply with the Payment Card Industry Data Security Standard (PCI DSS). This month we’ve prepared an interview for you, entitled Corporate Cyber Espionage, its not just China by Larry Karisny.