26%
CompTIA PenTest+ Study Guide: Exam PT0-001

CompTIA PenTest+ Study Guide: Exam PT0-001

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the newest intermediate cybersecurity certification exam. With expert coverage of Exam PT0-001 objectives, this book is your ideal companion throughout all stages of study; whether you’re just embarking on your certification journey or finalizing preparations for the big day, this invaluable resource helps you solidify your understanding of essential skills and concepts. Access to the Sybex online learning environment allows you to study anytime, anywhere with electronic flashcards, a searchable glossary, and more, while hundreds of practice exam questions help you step up your preparations and avoid surprises on exam day. The CompTIA PenTest+ certification validates your skills and knowledge surrounding second-generation penetration testing, vulnerability assessment, and vulnerability management on a variety of systems and devices, making it the latest go-to qualification in an increasingly mobile world. This book contains everything you need to prepare; identify what you already know, learn what you don’t know, and face the exam with full confidence! Perform security assessments on desktops and mobile devices, as well as cloud, IoT, industrial and embedded systems  Identify security weaknesses and manage system vulnerabilities Ensure that existing cybersecurity practices, configurations, and policies conform with current best practices Simulate cyberattacks to pinpoint security weaknesses in operating systems, networks, and applications As our information technology advances, so do the threats against it. It’s an arms race for complexity and sophistication, and the expansion of networked devices and the Internet of Things has integrated cybersecurity into nearly every aspect of our lives. The PenTest+ certification equips you with the skills you need to identify potential problems—and fix them—and the CompTIA PenTest+ Study Guide: Exam PT0-001 is the central component of a complete preparation plan. 

Table of Contents:
Introduction xxv Assessment Test lvi Chapter 1 Penetration Testing 1 What Is Penetration Testing? 2 Cybersecurity Goals 2 Adopting the Hacker Mind-Set 4 Reasons for Penetration Testing 5 Benefits of Penetration Testing 5 Regulatory Requirements for Penetration Testing 6 Who Performs Penetration Tests? 8 Internal Penetration Testing Teams 8 External Penetration Testing Teams 9 Selecting Penetration Testing Teams 9 The CompTIA Penetration Testing Process 10 Planning and Scoping 11 Information Gathering and Vulnerability Identification 11 Attacking and Exploiting 12 Reporting and Communicating Results 13 The Cyber Kill Chain 13 Reconnaissance 15 Weaponization 15 Delivery 16 Exploitation 16 Installation 16 Command and Control 16 Actions on Objectives 17 Tools of the Trade 17 Reconnaissance 19 Vulnerability Scanners 20 Social Engineering 21 Credential-Testing Tools 21 Debuggers 21 Software Assurance 22 Network Testing 22 Remote Access 23 Exploitation 23 Summary 23 Exam Essentials 24 Lab Exercises 25 Activity 1.1: Adopting the Hacker Mind-Set 25 Activity 1.2: Using the Cyber Kill Chain 25 Review Questions 26 Chapter 2 Planning and Scoping Penetration Tests 31 Scoping and Planning Engagements 35 Assessment Types 36 White Box, Black Box, or Gray Box? 36 The Rules of Engagement 38 Scoping Considerations: A Deeper Dive 40 Support Resources for Penetration Tests 42 Key Legal Concepts for Penetration Tests 45 Contracts 45 Data Ownership and Retention 46 Authorization 46 Environmental Differences 46 Understanding Compliance-Based Assessments 48 Summary 50 Exam Essentials 51 Lab Exercises 52 Review Questions 53 Chapter 3 Information Gathering 57 Footprinting and Enumeration 60 OSINT 61 Location and Organizational Data 64 Infrastructure and Networks 67 Security Search Engines 72 Active Reconnaissance and Enumeration 74 Hosts 75 Services 75 Networks, Topologies, and Network Traffic 81 Packet Crafting and Inspection 83 Enumeration 84 Information Gathering and Code 88 Information Gathering and Defenses 89 Defenses Against Active Reconnaissance 90 Preventing Passive Information Gathering 90 Summary 90 Exam Essentials 91 Lab Exercises 92 Activity 3.1: Manual OSINT Gathering 92 Activity 3.2: Exploring Shodan 93 Activity 3.3: Running a Nessus Scan 93 Review Questions 94 Chapter 4 Vulnerability Scanning 99 Identifying Vulnerability Management Requirements 102 Regulatory Environment 102 Corporate Policy 106 Support for Penetration Testing 106 Identifying Scan Targets 106 Determining Scan Frequency 107 Configuring and Executing Vulnerability Scans 109 Scoping Vulnerability Scans 110 Configuring Vulnerability Scans 111 Scanner Maintenance 117 Software Security Testing 119 Analyzing and Testing Code 120 Web Application Vulnerability Scanning 121 Developing a Remediation Workflow 125 Prioritizing Remediation 126 Testing and Implementing Fixes 127 Overcoming Barriers to Vulnerability Scanning 127 Summary 129 Exam Essentials 129 Lab Exercises 130 Activity 4.1: Installing a Vulnerability Scanner 130 Activity 4.2: Running a Vulnerability Scan 130 Activity 4.3: Developing a Penetration Test Vulnerability Scanning Plan 131 Review Questions 132 Chapter 5 Analyzing Vulnerability Scans 137 Reviewing and Interpreting Scan Reports 138 Understanding CVSS 142 Validating Scan Results 147 False Positives 147 Documented Exceptions 147 Understanding Informational Results 148 Reconciling Scan Results with Other Data Sources 149 Trend Analysis 149 Common Vulnerabilities 150 Server and Endpoint Vulnerabilities 151 Network Vulnerabilities 161 Virtualization Vulnerabilities 167 Internet of Things (IoT) 169 Web Application Vulnerabilities 170 Summary 172 Exam Essentials 173 Lab Exercises 174 Activity 5.1: Interpreting a Vulnerability Scan 174 Activity 5.2: Analyzing a CVSS Vector 174 Activity 5.3: Developing a Penetration Testing Plan 175 Review Questions 176 Chapter 6 Exploit and Pivot 181 Exploits and Attacks 184 Choosing Targets 184 Identifying the Right Exploit 185 Exploit Resources 188 Developing Exploits 189 Exploitation Toolkits 191 Metasploit 192 PowerSploit 198 Exploit Specifics 199 RPC/DCOM 199 PsExec 199 PS Remoting/WinRM 199 WMI 200 Scheduled Tasks and cron Jobs 200 SMB 201 RDP 202 Apple Remote Desktop 203 VNC 203 X-Server Forwarding 203 Telnet 203 SSH 204 Leveraging Exploits 204 Common Post-Exploit Attacks 204 Privilege Escalation 207 Social Engineering 208 Persistence and Evasion 209 Scheduled Jobs and Scheduled Tasks 209 Inetd Modification 210 Daemons and Services 210 Back Doors and Trojans 210 New Users 211 Pivoting 211 Covering Your Tracks 212 Summary 213 Exam Essentials 214 Lab Exercises 215 Activity 6.1: Exploit 215 Activity 6.2: Discovery 215 Activity 6.3: Pivot 216 Review Questions 217 Chapter 7 Exploiting Network Vulnerabilities 223 Conducting Network Exploits 226 VLAN Hopping 226 Network Proxies 228 DNS Cache Poisoning 228 Man-in-the-Middle 229 NAC Bypass 233 DoS Attacks and Stress Testing 234 Exploiting Windows Services 236 NetBIOS Name Resolution Exploits 236 SMB Exploits 240 Exploiting Common Services 240 SNMP Exploits 241 SMTP Exploits 242 FTP Exploits 243 Samba Exploits 244 Wireless Exploits 245 Evil Twins and Wireless MITM 245 Other Wireless Protocols and Systems 247 RFID Cloning 248 Jamming 249 Repeating 249 Summary 250 Exam Essentials 251 Lab Exercises 251 Activity 7.1: Capturing Hashes 251 Activity 7.2: Brute-Forcing Services 252 Activity 7.3: Wireless Testing 253 Review Questions 254 Chapter 8 Exploiting Physical and Social Vulnerabilities 259 Physical Facility Penetration Testing 262 Entering Facilities 262 Information Gathering 266 Social Engineering 266 In-Person Social Engineering 267 Phishing Attacks 269 Website-Based Attacks 270 Using Social Engineering Tools 270 Summary 273 Exam Essentials 274 Lab Exercises 275 Activity 8.1: Designing a Physical Penetration Test 275 Activity 8.2: Brute-Forcing Services 276 Activity 8.3: Using Beef 276 Review Questions 278 Chapter 9 Exploiting Application Vulnerabilities 283 Exploiting Injection Vulnerabilities 287 Input Validation 287 Web Application Firewalls 288 SQL Injection Attacks 289 Code Injection Attacks 292 Command Injection Attacks 293 Exploiting Authentication Vulnerabilities 293 Password Authentication 294 Session Attacks 295 Kerberos Exploits 298 Exploiting Authorization Vulnerabilities 299 Insecure Direct Object References 299 Directory Traversal 300 File Inclusion 301 Exploiting Web Application Vulnerabilities 302 Cross-Site Scripting (XSS) 302 Cross-Site Request Forgery (CSRF/XSRF) 305 Clickjacking 305 Unsecure Coding Practices 306 Source Code Comments 306 Error Handling 306 Hard-Coded Credentials 307 Race Conditions 308 Unprotected APIs 308 Unsigned Code 308 Application Testing Tools 308 Static Application Security Testing (SAST) 309 Dynamic Application Security Testing (DAST) 310 Mobile Tools 313 Summary 313 Exam Essentials 313 Lab Exercises 314 Activity 9.1: Application Security Testing Techniques 314 Activity 9.2: Using the ZAP Proxy 314 Activity 9.3: Creating a Cross-Site Scripting Vulnerability 315 Review Questions 316 Chapter 10 Exploiting Host Vulnerabilities 321 Attacking Hosts 325 Linux 325 Windows 331 Cross-Platform Exploits 338 Remote Access 340 SSH 340 NETCAT and Ncat 341 Proxies and Proxychains 341 Metasploit and Remote Access 342 Attacking Virtual Machines and Containers 342 Virtual Machine Attacks 343 Container Attacks 344 Physical Device Security 345 Cold-Boot Attacks 345 Serial Consoles 345 JTAG Debug Pins and Ports 346 Attacking Mobile Devices 347 Credential Attacks 348 Credential Acquisition 348 Offline Password Cracking 349 Credential Testing and Brute-Forcing Tools 350 Wordlists and Dictionaries 351 Summary 352 Exam Essentials 353 Lab Exercises 354 Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials 354 Activity 10.2: Cracking Passwords Using Hashcat 355 Activity 10.3: Setting Up a Reverse Shell and a Bind Shell 356 Review Questions 358 Chapter 11 Scripting for Penetration Testing 363 Scripting and Penetration Testing 364 Bash 365 PowerShell 366 Ruby 367 Python 368 Variables, Arrays, and Substitutions 368 Bash 370 PowerShell 371 Ruby 371 Python 372 Comparison Operations 372 String Operations 373 Bash 375 PowerShell 376 Ruby 377 Python 378 Flow Control 378 Conditional Execution 379 For Loops 384 While Loops 389 Input and Output (I/O) 394 Redirecting Standard Input and Output 394 Error Handling 395 Bash 395 PowerShell 396 Ruby 396 Python 396 Summary 397 Exam Essentials 397 Lab Exercises 398 Activity 11.1: Reverse DNS Lookups 398 Activity 11.2: Nmap Scan 398 Review Questions 399 Chapter 12 Reporting and Communication 405 The Importance of Communication 408 Defining a Communication Path 408 Communication Triggers 408 Goal Reprioritization 409 Recommending Mitigation Strategies 409 Finding: Shared Local Administrator Credentials 411 Finding: Weak Password Complexity 411 Finding: Plain Text Passwords 413 Finding: No Multifactor Authentication 413 Finding: SQL Injection 414 Finding: Unnecessary Open Services 415 Writing a Penetration Testing Report 415 Structuring the Written Report 415 Secure Handling and Disposition of Reports 417 Wrapping Up the Engagement 418 Post-Engagement Cleanup 418 Client Acceptance 419 Lessons Learned 419 Follow-Up Actions/Retesting 419 Attestation of Findings 419 Summary 420 Exam Essentials 420 Lab Exercises 421 Activity 12.1: Remediation Strategies 421 Activity 12.2: Report Writing 421 Review Questions 422 Appendix Answers to Review Questions 425 Chapter 1: Penetration Testing 426 Chapter 2: Planning and Scoping Penetration Tests 427 Chapter 3: Information Gathering 429 Chapter 4: Vulnerability Scanning 431 Chapter 5: Analyzing Vulnerability Scans 433 Chapter 6: Exploit and Pivot 434 Chapter 7: Exploiting Network Vulnerabilities 436 Chapter 8: Exploiting Physical and Social Vulnerabilities 438 Chapter 9: Exploiting Application Vulnerabilities 440 Chapter 10: Exploiting Host Vulnerabilities 442 Chapter 11: Script for Penetration Testing 444 Chapter 12: Reporting and Communication 445 Index 447


Best Sellers


Product Details
  • ISBN-13: 9781119504221
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 234 mm
  • No of Pages: 544
  • Spine Width: 36 mm
  • Weight: 903 gr
  • ISBN-10: 1119504228
  • Publisher Date: 27 Nov 2018
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Sub Title: Exam PT0-001
  • Width: 185 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
CompTIA PenTest+ Study Guide: Exam PT0-001
John Wiley & Sons Inc -
CompTIA PenTest+ Study Guide: Exam PT0-001
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CompTIA PenTest+ Study Guide: Exam PT0-001

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA