The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second Edition (2013)
CHAPTER 1. What is Penetration Testing?
CHAPTER 6. Web-Based Exploitation
CHAPTER 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
CHAPTER 8. Wrapping Up the Penetration Test