ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002), 2nd Edition

دانلود کتاب راهنمای آزمون CompTIA PenTest+ Certification All-in-One Exam، ویرایش دوم (Exam PT0-002)، ویرایش 2

CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002), 2nd Edition

مشخصات کتاب

CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002), 2nd Edition

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9781264274901, 1264274890 
ناشر: McGraw-Hill 
سال نشر: 2022 
تعداد صفحات:  
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 22 Mb 

قیمت کتاب (تومان) : 42,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002), 2nd Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای آزمون CompTIA PenTest+ Certification All-in-One Exam، ویرایش دوم (Exam PT0-002)، ویرایش 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Title Page
Copyright Page
Dedication
Contents
Acknowledgments
Introduction
Chapter 1 Planning and Engagement
	Governance, Risk, and Compliance
		Regulatory and Compliance Considerations
	Testing Limitations
		Time-Based Limitations
		Asset Scope Limitations
		Tool Limitations
		Allowed and Disallowed Tests
	Contracts and Documentation
		Master Services Agreement
		Nondisclosure Agreement
		Statement of Work
		Rules of Engagement
		Permission to Test
	Scope and Requirements
		Standards
		Environmental Considerations for Scoping
		Target Selection
		Contract Review
		Communication Planning
	Professionalism and Integrity
		Communication
		Integrity
		Risks to the Tester
	Chapter Review
		Questions
		Answers
	References
Chapter 2 Information Gathering and Vulnerability Scanning
	Passive Reconnaissance
		DNS Recon
		OSINT
		Search Engines
	Active Reconnaissance
		Host Enumeration
		Service Identification and Fingerprinting
		Web Content Enumeration
		User Enumeration
		Defense Detection and Detection Avoidance
	Vulnerability Scanning and Analysis
		Credentialed vs. Noncredentialed Scanning
		Compliance and Configuration Auditing
		Vulnerability Research Sources
	Chapter Review
		Questions
		Answers
	References
Chapter 3 Network-Based Attacks
	Name Resolution Exploits
		DNS Spoofing and Cache Poisoning
		Attacking LLMNR and NetBIOS
	Password Attacks
		Brute-Force and Dictionary Attacks
		Password Spraying
		Hash Cracking
	Stress Testing Applications and Protocols
	Network Packet Manipulation
		Analyzing and Inspecting Packets
		Forge and Decode Packets
	Layer 2 Attacks
		Attacking the Spanning Tree Protocol
		VLAN Hopping
		Bypassing Network Access Controls
	Researching an Attack
		An Attack on FTP
		An Attack on Samba and NFS
	Chapter Review
		Questions
		Answers
Chapter 4 Wireless and RF Attacks
	802.11 Wireless
		Wireless Networking Overview
		Wireless Testing Equipment
		Attacking Wireless
	Attacking Bluetooth
		Bluetooth Specifications
		Device Discovery
		Bluetooth Attacks
	RFID and NFC
	Chapter Review
		Questions
		Answers
	References
Chapter 5 Web and Database Attacks
	OWASP Top Ten
	Injection Attacks
		Command Injection
		SQL Injection
		LDAP Injection
		Cross-Site Scripting
		Cross-Site Request Forgery
	Attacking Authentication and Session Management
		Brute-Force Login Pages
		Session Management Testing
	Data Exposure and Insecure Configuration
		Weak Access Controls
		Exposing Sensitive Data
		Directory and Path Traversals
		Sensitive Data Exposure
	Inclusion Attacks
	Race Conditions
	Chapter Review
		Questions
		Answers
Chapter 6 Attacking the Cloud
	Account and Privilege Attacks
		Credential Harvesting
		Privesc
		Account Takeover
		Password Spraying
	Misconfigured Cloud Assets
		Identity and Access Management
		Federation
		Object Storage
		Containerization Technologies
	Cloud-Centric Attacks
		Denial of Service
		Cloud Malware Injection
		Side-Channel Attacks
		Software Development Kits
	Chapter Review
		Questions
		Answers
Chapter 7 Specialized and Fragile Systems
	Mobile Devices
		Testing Concepts
		Mobile Hardware
		Mobile Operating Systems Overview
		Mobile Applications Overview
		Testing iOS
		Testing Android
	Virtual and Containerized Systems
	Other Nontraditional Systems
		SCADA and Industrial Control Systems
		Embedded Systems
	Chapter Review
		Questions
		Answers
Chapter 8 Social Engineering and Physical Attacks
	Physical Security and Social Engineering
		Pretexting and Impersonation
		Methods of Influence
	Social Engineering and Physical Attacks
		Phishing Attacks
		Other Web Attacks
		Social Engineering Tools
		Dumpster Diving
		USB Dropping
		Shoulder Surfing
		Tailgating
		Badges
		Basic Physpen Tools
	Countermeasures
	Chapter Review
		Questions
		Answers
	References
Chapter 9 Post-Exploitation
	Enumeration
		Discovery
		Credential Access
	Privilege Escalation
		Linux Privilege Escalation
		Windows Privilege Escalation
	Covert Channels and Data Exfiltration
		SSH Tunneling
		Shell Types
		Command and Control
		Data Exfiltration
	Lateral Movement
		Living Off the Land
		Passing the Hash
		RPC/DCOM
		Remote Desktop Protocol
		WinRM
	Maintaining Persistence
		Windows
		Linux
	Covering Your Tracks
		Clearing Command History
		Timestomping
		File Deletion
	Chapter Review
		Questions
		Answers
Chapter 10 Post-Engagement Activities
	The Anatomy of a Pentest Report
		Reporting Audience
		Report Contents
		Storage and Secure Distribution
		Attestations
	Findings, Recommendations, and Analysis
		Recommendations
		Common Themes and Root Causes
	Post-Engagement Activities
		Cleanup
		Client Acceptance
		Lessons Learned
		Retesting and Follow-up
	Chapter Review
		Questions
		Answers
	References
Chapter 11 Tools and Code Analysis
	Logic Constructs
		Conditionals
		Loops
		Boolean Operators
		Arithmetic and String Operators
	Data Structures
		Key Values and Keys
		Arrays, Dictionaries, and Lists
		Trees
		CSV, XML, and JSON
	Other Programming Concepts
		Procedures
		Functions
		Classes
		Libraries
	Practical Examples
		Bash
		Python
		Perl
		Ruby
		JavaScript
		PowerShell
	Specialized Examples
		Bash Shells
		Bash Automation
		PowerShell Shells
		PowerShell: Enumerating AD Users and Computers
		Python Port Scanner
		Python Encoding
		Using Python to Upgrade to a Fully Interactive Shell
		Using Perl to Modify IP Addresses in a File
		Perl Reverse Shell
		JavaScript Downloader
	Chapter Review
		Questions
		Answers
Chapter 12 Tools Inventory
Appendix A Objective Map
	Objective Map: Exam PT0-002
Appendix B About the Online Content
	System Requirements
	Your Total Seminars Training Hub Account
		Privacy Notice
	Single User License Terms and Conditions
	TotalTester Online
	Other Book Resources
		Performance-Based Questions
		Downloadable Content
Technical Support
Glossary
Index




نظرات کاربران