Acknowledgments |
|
xi | |
Introduction |
|
xiii | |
Objective Map: Exam PT0-001 |
|
xvi | |
Chapter 1 Pre-engagement Activities |
|
1 | (22) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (9) |
|
|
5 | (2) |
|
|
7 | (3) |
|
|
10 | (2) |
|
|
12 | (4) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (2) |
|
|
16 | (7) |
|
|
16 | (2) |
|
|
18 | (5) |
Chapter 2 Getting to Know Your Targets |
|
23 | (22) |
|
Footprinting and Reconnaissance |
|
|
23 | (1) |
|
|
23 | (1) |
|
Tools, Methods, and Frameworks |
|
|
24 | (15) |
|
|
24 | (5) |
|
Specialized Search Engines |
|
|
29 | (4) |
|
DNS, Website, and Email Footprinting |
|
|
33 | (6) |
|
|
39 | (1) |
|
|
39 | (6) |
|
|
40 | (2) |
|
|
42 | (3) |
Chapter 3 Network Scanning and Enumeration |
|
45 | (26) |
|
802.11 Wireless Standards |
|
|
45 | (4) |
|
|
46 | (1) |
|
Wireless Modes and Terminology |
|
|
46 | (3) |
|
Wireless Testing Equipment |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (4) |
|
|
51 | (2) |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
55 | (2) |
|
|
57 | (5) |
|
|
57 | (1) |
|
Common Ports and Protocols |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (2) |
|
|
64 | (7) |
|
|
64 | (2) |
|
|
66 | (5) |
Chapter 4 Vulnerability Scanning and Analysis |
|
71 | (34) |
|
Researching Vulnerabilities |
|
|
71 | (5) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (9) |
|
Credentialed vs. Noncredentialed Scanning |
|
|
78 | (2) |
|
Compliance and Configuration Auditing |
|
|
80 | (1) |
|
|
81 | (4) |
|
Web and Database Scanning |
|
|
85 | (13) |
|
Open Web Application Security Project (OWASP) |
|
|
85 | (1) |
|
Fingerprinting Web and Database Servers |
|
|
86 | (2) |
|
|
88 | (1) |
|
Authentication and Authorization Testing |
|
|
89 | (7) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (7) |
|
|
98 | (2) |
|
|
100 | (5) |
Chapter 5 Mobile Device and Application Testing |
|
105 | (42) |
|
Mobile Device Architecture |
|
|
105 | (5) |
|
|
107 | (2) |
|
|
109 | (1) |
|
Mobile Pentesting Fundamentals |
|
|
110 | (3) |
|
|
111 | (1) |
|
Dynamic and Runtime Analysis |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
iOS Application Security Testing |
|
|
113 | (10) |
|
Setting Up an iOS Testing Environment |
|
|
113 | (1) |
|
Jailbreaking an iOS Device |
|
|
113 | (2) |
|
Connecting to the iOS Device |
|
|
115 | (2) |
|
iOS Functional Testing and Application Mapping |
|
|
117 | (6) |
|
Android Application Security Testing |
|
|
123 | (7) |
|
Setting Up an Android Testing Environment |
|
|
123 | (1) |
|
Rooting an Android Device |
|
|
124 | (1) |
|
Connecting to the Android Device |
|
|
124 | (1) |
|
Android Functional Testing and Application Mapping |
|
|
125 | (5) |
|
Software Assurance Testing |
|
|
130 | (7) |
|
Understanding Programming Logic |
|
|
131 | (6) |
|
|
137 | (10) |
|
|
138 | (3) |
|
|
141 | (6) |
Chapter 6 Social Engineering |
|
147 | (16) |
|
|
147 | (1) |
|
Social Engineering Attacks |
|
|
148 | (1) |
|
|
149 | (6) |
|
|
149 | (6) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (7) |
|
|
157 | (1) |
|
|
158 | (5) |
Chapter 7 Network-Based Attacks |
|
163 | (42) |
|
|
163 | (13) |
|
DNS Spoofing and Cache Poisoning |
|
|
165 | (4) |
|
Attacking LLMNR and NetBIOS |
|
|
169 | (7) |
|
Stress Testing Applications and Protocols |
|
|
176 | (3) |
|
Denial of Service Attacks |
|
|
176 | (2) |
|
|
178 | (1) |
|
Network Packet Manipulation |
|
|
179 | (4) |
|
Analyzing and Inspecting Packets |
|
|
179 | (2) |
|
|
181 | (2) |
|
|
183 | (3) |
|
Attacking the Spanning Tree Protocol |
|
|
183 | (1) |
|
|
184 | (1) |
|
Bypassing Network Access Controls |
|
|
185 | (1) |
|
Attacking Common Protocols |
|
|
186 | (12) |
|
|
186 | (2) |
|
Poorly Configured File Sharing |
|
|
188 | (9) |
|
|
197 | (1) |
|
|
198 | (7) |
|
|
198 | (2) |
|
|
200 | (5) |
Chapter 8 Wireless and RF Attacks |
|
205 | (28) |
|
Wireless Encryption Standards |
|
|
206 | (1) |
|
Setting Up a Wireless Testing Lab |
|
|
206 | (13) |
|
|
206 | (6) |
|
Wi-Fi Protected Access (WPA) |
|
|
212 | (5) |
|
|
217 | (2) |
|
Wireless Attacks and Exploitation |
|
|
219 | (6) |
|
Man-in-the-Middle Attacks |
|
|
220 | (2) |
|
|
222 | (3) |
|
|
225 | (8) |
|
|
226 | (2) |
|
|
228 | (5) |
Chapter 9 Web and Database Attacks |
|
233 | (38) |
|
|
233 | (27) |
|
|
233 | (12) |
|
Attacking Authentication and Session Management |
|
|
245 | (6) |
|
|
251 | (2) |
|
Exploiting Security Misconfigurations |
|
|
253 | (7) |
|
|
260 | (4) |
|
|
261 | (1) |
|
|
261 | (2) |
|
Cross-Site Request Forgery |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (7) |
|
|
265 | (2) |
|
|
267 | (4) |
Chapter 10 Attacking Local Host Vulnerabilities |
|
271 | (74) |
|
|
271 | (2) |
|
|
273 | (6) |
|
Gain Situational Awareness |
|
|
273 | (3) |
|
|
276 | (2) |
|
|
278 | (1) |
|
|
279 | (21) |
|
Linux Privilege Escalation |
|
|
279 | (6) |
|
Windows Privilege Escalation |
|
|
285 | (15) |
|
|
300 | (18) |
|
|
300 | (13) |
|
|
313 | (5) |
|
|
318 | (13) |
|
Lateral Movement in Linux |
|
|
318 | (10) |
|
Lateral Movement in Windows |
|
|
328 | (3) |
|
|
331 | (5) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (2) |
|
|
336 | (1) |
|
|
336 | (9) |
|
|
337 | (2) |
|
|
339 | (6) |
Chapter 11 Physical Penetration Testing |
|
345 | (30) |
|
Keeping the Honest People Honest |
|
|
347 | (18) |
|
|
347 | (1) |
|
Physical and Environmental Protection |
|
|
348 | (4) |
|
Physical Locks and Security |
|
|
352 | (1) |
|
|
353 | (7) |
|
Basic Tools and Opening Techniques |
|
|
360 | (3) |
|
Alarms and Early Warning Systems |
|
|
363 | (2) |
|
|
365 | (2) |
|
|
365 | (1) |
|
|
365 | (2) |
|
|
367 | (1) |
|
|
367 | (8) |
|
|
368 | (2) |
|
|
370 | (5) |
Chapter 12 Reporting and Communication |
|
375 | (30) |
|
Writing the Pentest Report |
|
|
375 | (23) |
|
|
377 | (19) |
|
|
396 | (1) |
|
|
397 | (1) |
|
Post-Report Delivery Activities |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (6) |
|
|
400 | (2) |
|
|
402 | (3) |
Appendix About the Online Content |
|
405 | (4) |
Glossary |
|
409 | (14) |
Index |
|
423 | |