CompTIA® PenTest+ Study Guide最新文献

筛选
英文 中文
Vulnerability Scanning 漏洞扫描
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch4
Abbas Moallem
{"title":"Vulnerability Scanning","authors":"Abbas Moallem","doi":"10.1002/9781119549420.ch4","DOIUrl":"https://doi.org/10.1002/9781119549420.ch4","url":null,"abstract":"- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploit and Pivot 利用和支点
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch6
{"title":"Exploit and Pivot","authors":"","doi":"10.1002/9781119549420.ch6","DOIUrl":"https://doi.org/10.1002/9781119549420.ch6","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125196638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Application Vulnerabilities 利用应用程序漏洞
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch9
{"title":"Exploiting Application Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch9","DOIUrl":"https://doi.org/10.1002/9781119549420.ch9","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.index
{"title":"Index","authors":"","doi":"10.1002/9781119549420.index","DOIUrl":"https://doi.org/10.1002/9781119549420.index","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reporting and Communication 报告和沟通
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch12
B. Branstetter
{"title":"Reporting and Communication","authors":"B. Branstetter","doi":"10.1002/9781119549420.ch12","DOIUrl":"https://doi.org/10.1002/9781119549420.ch12","url":null,"abstract":"Corresponding Authors: David L. Weiss, MD, FSIIM, Associate Professor, Department of Radiology, Virginia Tech Carilion School of Medicine and Research Institute Woojin Kim, MD, Assistant Professor of Radiology, Interim Chief of Division of Musculoskeletal Imaging, Chief of Radiography and Fluoroscopy, Director of the Center for Translational Imaging Informatics, Associate Director of Imaging Informatics, Perelman School of Medicine at the University of Pennsylvania","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration Testing 渗透测试
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch1
{"title":"Penetration Testing","authors":"","doi":"10.1002/9781119549420.ch1","DOIUrl":"https://doi.org/10.1002/9781119549420.ch1","url":null,"abstract":"Our application penetration testers have extensive experience building software—not just trying to break it. They leverage this experience to pinpoint business-critical issues and provide actionable remediation guidance. As a result of our pen tests, you’ll be able to view your applications through the eyes of both a hacker and an experienced developer to discover where you can improve your security posture.","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Physical and Social Vulnerabilities 利用物理和社会脆弱性
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch8
{"title":"Exploiting Physical and Social Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch8","DOIUrl":"https://doi.org/10.1002/9781119549420.ch8","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scripting for Penetration Testing 为渗透测试编写脚本
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch11
{"title":"Scripting for Penetration Testing","authors":"","doi":"10.1002/9781119549420.ch11","DOIUrl":"https://doi.org/10.1002/9781119549420.ch11","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122048481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Host Vulnerabilities 利用主机漏洞
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch10
{"title":"Exploiting Host Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch10","DOIUrl":"https://doi.org/10.1002/9781119549420.ch10","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129673803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Network Vulnerabilities 利用网络漏洞
CompTIA® PenTest+ Study Guide Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch7
{"title":"Exploiting Network Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch7","DOIUrl":"https://doi.org/10.1002/9781119549420.ch7","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123739488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信