Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
Chapter 1 Planning and Engagement |
|
1 | (34) |
|
Governance, Risk, and Compliance |
|
|
1 | (5) |
|
Regulatory and Compliance Considerations |
|
|
2 | (4) |
|
|
6 | (2) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Allowed and Disallowed Tests |
|
|
8 | (1) |
|
Contracts and Documentation |
|
|
8 | (3) |
|
Master Services Agreement |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (15) |
|
|
11 | (7) |
|
Environmental Considerations for Scoping |
|
|
18 | (1) |
|
|
19 | (4) |
|
|
23 | (2) |
|
|
25 | (1) |
|
Professionalism and Integrity |
|
|
26 | (4) |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (3) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (2) |
Chapter 2 Information Gathering and Vulnerability Scanning |
|
35 | (54) |
|
|
36 | (22) |
|
|
36 | (8) |
|
|
44 | (7) |
|
|
51 | (7) |
|
|
58 | (20) |
|
|
58 | (4) |
|
Service Identification and Fingerprinting |
|
|
62 | (6) |
|
|
68 | (3) |
|
|
71 | (2) |
|
Defense Detection and Detection Avoidance |
|
|
73 | (5) |
|
Vulnerability Scanning and Analysis |
|
|
78 | (7) |
|
Credentialed vs. Noncredentialed Scanning |
|
|
79 | (2) |
|
Compliance and Configuration Auditing |
|
|
81 | (1) |
|
Vulnerability Research Sources |
|
|
82 | (3) |
|
|
85 | (2) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (2) |
Chapter 3 Network-Based Attacks |
|
89 | (34) |
|
|
89 | (10) |
|
DNS Spoofing and Cache Poisoning |
|
|
91 | (3) |
|
Attacking LLMNR and NetBIOS |
|
|
94 | (5) |
|
|
99 | (6) |
|
Brute-Force and Dictionary Attacks |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (4) |
|
Stress Testing Applications and Protocols |
|
|
105 | (3) |
|
Network Packet Manipulation |
|
|
108 | (3) |
|
Analyzing and Inspecting Packets |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (3) |
|
Attacking the Spanning Tree Protocol |
|
|
111 | (2) |
|
|
113 | (1) |
|
Bypassing Network Access Controls |
|
|
114 | (1) |
|
|
114 | (5) |
|
|
114 | (2) |
|
An Attack on Samba and NFS |
|
|
116 | (3) |
|
|
119 | (4) |
|
|
120 | (1) |
|
|
121 | (2) |
Chapter 4 Wireless and RF Attacks |
|
123 | (34) |
|
|
123 | (25) |
|
Wireless Networking Overview |
|
|
123 | (8) |
|
Wireless Testing Equipment |
|
|
131 | (1) |
|
|
132 | (16) |
|
|
148 | (2) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
153 | (3) |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
156 | (1) |
Chapter 5 Web and Database Attacks |
|
157 | (38) |
|
|
157 | (1) |
|
|
157 | (16) |
|
|
158 | (3) |
|
|
161 | (7) |
|
|
168 | (1) |
|
|
169 | (2) |
|
Cross-Site Request Forgery |
|
|
171 | (2) |
|
Attacking Authentication and Session Management |
|
|
173 | (7) |
|
|
173 | (3) |
|
Session Management Testing |
|
|
176 | (4) |
|
Data Exposure and Insecure Configuration |
|
|
180 | (8) |
|
|
181 | (1) |
|
|
182 | (2) |
|
Directory and Path Traversals |
|
|
184 | (3) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (6) |
|
|
190 | (2) |
|
|
192 | (3) |
Chapter 6 Attacking the Cloud |
|
195 | (20) |
|
Account and Privilege Attacks |
|
|
196 | (7) |
|
|
196 | (1) |
|
|
197 | (5) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Misconfigured Cloud Assets |
|
|
203 | (6) |
|
Identity and Access Management |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
205 | (3) |
|
Containerization Technologies |
|
|
208 | (1) |
|
|
209 | (4) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
Software Development Kits |
|
|
211 | (2) |
|
|
213 | (2) |
|
|
213 | (1) |
|
|
214 | (1) |
Chapter 7 Specialized and Fragile Systems |
|
215 | (34) |
|
|
216 | (23) |
|
|
216 | (2) |
|
|
218 | (1) |
|
Mobile Operating Systems Overview |
|
|
219 | (2) |
|
Mobile Applications Overview |
|
|
221 | (3) |
|
|
224 | (6) |
|
|
230 | (9) |
|
Virtual and Containerized Systems |
|
|
239 | (1) |
|
Other Nontraditional Systems |
|
|
240 | (3) |
|
SCADA and Industrial Control Systems |
|
|
240 | (3) |
|
|
243 | (1) |
|
|
243 | (6) |
|
|
244 | (2) |
|
|
246 | (3) |
Chapter 8 Social Engineering and Physical Attacks |
|
249 | (24) |
|
Physical Security and Social Engineering |
|
|
250 | (5) |
|
Pretexting and Impersonation |
|
|
254 | (1) |
|
|
255 | (1) |
|
Social Engineering and Physical Attacks |
|
|
255 | (12) |
|
|
256 | (3) |
|
|
259 | (1) |
|
|
260 | (5) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (3) |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
271 | (2) |
Chapter 9 Post-Exploitation |
|
273 | (50) |
|
|
273 | (14) |
|
|
274 | (5) |
|
|
279 | (8) |
|
|
287 | (18) |
|
Linux Privilege Escalation |
|
|
288 | (7) |
|
Windows Privilege Escalation |
|
|
295 | (10) |
|
Covert Channels and Data Exfiltration |
|
|
305 | (4) |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (4) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (3) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (3) |
|
|
316 | (1) |
|
|
317 | (2) |
|
|
319 | (1) |
|
|
319 | (4) |
|
|
320 | (2) |
|
|
322 | (1) |
Chapter 10 Post-Engagement Activities |
|
323 | (24) |
|
The Anatomy of a Pentest Report |
|
|
323 | (10) |
|
|
324 | (1) |
|
|
325 | (7) |
|
Storage and Secure Distribution |
|
|
332 | (1) |
|
|
333 | (1) |
|
Findings, Recommendations, and Analysis |
|
|
333 | (8) |
|
|
337 | (3) |
|
Common Themes and Root Causes |
|
|
340 | (1) |
|
Post-Engagement Activities |
|
|
341 | (2) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (2) |
|
|
343 | (2) |
|
|
345 | (1) |
|
|
345 | (2) |
Chapter 11 Tools and Code Analysis |
|
347 | (32) |
|
|
347 | (4) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
Arithmetic and String Operators |
|
|
350 | (1) |
|
|
351 | (3) |
|
|
351 | (1) |
|
Arrays, Dictionaries, and Lists |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
352 | (2) |
|
Other Programming Concepts |
|
|
354 | (3) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (8) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (10) |
|
|
365 | (1) |
|
|
366 | (2) |
|
|
368 | (1) |
|
PowerShell: Enumerating AD Users and Computers |
|
|
369 | (1) |
|
|
370 | (2) |
|
|
372 | (1) |
|
Using Python to Upgrade to a Fully Interactive Shell |
|
|
372 | (1) |
|
Using Perl to Modify IP Addresses in a File |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (22) |
|
|
376 | (1) |
|
|
377 | (2) |
Chapter 12 Tools Inventory |
|
379 | (18) |
Appendix A Objective Map |
|
397 | (2) |
|
Objective Map: Exam PTO-002 |
|
|
397 | (2) |
Appendix B About the Online Content |
|
399 | (4) |
|
|
399 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
399 | (1) |
|
|
399 | (1) |
|
Single User License Terms and Conditions |
|
|
399 | (2) |
|
|
401 | (1) |
|
|
401 | (1) |
|
Performance-Based Questions |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
Glossary |
|
403 | (22) |
Index |
|
425 | |