首页 > 最新文献

CompTIA® PenTest+ Study Guide最新文献

英文 中文
Vulnerability Scanning 漏洞扫描
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch4
Abbas Moallem
- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.
-高等教育机构的科学进步使其成为恶意网络攻击的目标。Nessus和Burp等现代扫描器可以查明组织的漏洞,以便随后进行缓解。然而,由工具生成的更正报告通常会导致重要的信息过载,而无法生成不公正的解决方案。因此,高等教育机构缺乏适当的知识来改善其网络安全态势。然而,如果不了解系统中的漏洞,就很难在现实世界中进行成功的网络防御,以防止入侵者。因此,漏洞扫描是网络安全课程成功的关键因素。在本文中,我们倾向于回顾当前开源漏洞扫描工具的艺术状态。对漏洞、漏洞扫描、漏洞扫描工具、安全漏洞、系统安全和应用程序安全、恶意网络攻击等方面进行了文献调查,在漏洞评估和报告方面开展了大量工作。本报告对漏洞扫描工具进行了详尽的研究。本文主要介绍了漏洞扫描和报告两个方面。然后,我们找出相关实践的差距,并提出了选择的结果,我们强调了未来的方向,并总结了本研究。我们提供了对顶级开源网络漏洞扫描工具的详细描述。然后,我们提出了我们的动手实验室研究设计,详细介绍了我们专门设计的网络漏洞扫描,以增强网络安全课程。
{"title":"Vulnerability Scanning","authors":"Abbas Moallem","doi":"10.1002/9781119549420.ch4","DOIUrl":"https://doi.org/10.1002/9781119549420.ch4","url":null,"abstract":"- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploit and Pivot 利用和支点
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch6
{"title":"Exploit and Pivot","authors":"","doi":"10.1002/9781119549420.ch6","DOIUrl":"https://doi.org/10.1002/9781119549420.ch6","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125196638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Application Vulnerabilities 利用应用程序漏洞
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch9
{"title":"Exploiting Application Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch9","DOIUrl":"https://doi.org/10.1002/9781119549420.ch9","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.index
{"title":"Index","authors":"","doi":"10.1002/9781119549420.index","DOIUrl":"https://doi.org/10.1002/9781119549420.index","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reporting and Communication 报告和沟通
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch12
B. Branstetter
Corresponding Authors: David L. Weiss, MD, FSIIM, Associate Professor, Department of Radiology, Virginia Tech Carilion School of Medicine and Research Institute Woojin Kim, MD, Assistant Professor of Radiology, Interim Chief of Division of Musculoskeletal Imaging, Chief of Radiography and Fluoroscopy, Director of the Center for Translational Imaging Informatics, Associate Director of Imaging Informatics, Perelman School of Medicine at the University of Pennsylvania
通讯作者:David L. Weiss,医学博士,FSIIM,副教授,弗吉尼亚理工大学Carilion医学院和研究所放射学系,Woojin Kim,医学博士,放射学助理教授,肌肉骨骼成像部门临时主任,放射摄影和透视主任,转化成像信息学中心主任,宾夕法尼亚大学Perelman医学院成像信息学副主任
{"title":"Reporting and Communication","authors":"B. Branstetter","doi":"10.1002/9781119549420.ch12","DOIUrl":"https://doi.org/10.1002/9781119549420.ch12","url":null,"abstract":"Corresponding Authors: David L. Weiss, MD, FSIIM, Associate Professor, Department of Radiology, Virginia Tech Carilion School of Medicine and Research Institute Woojin Kim, MD, Assistant Professor of Radiology, Interim Chief of Division of Musculoskeletal Imaging, Chief of Radiography and Fluoroscopy, Director of the Center for Translational Imaging Informatics, Associate Director of Imaging Informatics, Perelman School of Medicine at the University of Pennsylvania","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration Testing 渗透测试
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch1
Our application penetration testers have extensive experience building software—not just trying to break it. They leverage this experience to pinpoint business-critical issues and provide actionable remediation guidance. As a result of our pen tests, you’ll be able to view your applications through the eyes of both a hacker and an experienced developer to discover where you can improve your security posture.
我们的应用程序渗透测试人员拥有构建软件的丰富经验——而不仅仅是试图破坏它。他们利用这种经验来查明业务关键问题,并提供可操作的补救指导。通过我们的渗透测试,您将能够通过黑客和经验丰富的开发人员的眼睛来查看您的应用程序,从而发现可以在哪些方面改进您的安全状态。
{"title":"Penetration Testing","authors":"","doi":"10.1002/9781119549420.ch1","DOIUrl":"https://doi.org/10.1002/9781119549420.ch1","url":null,"abstract":"Our application penetration testers have extensive experience building software—not just trying to break it. They leverage this experience to pinpoint business-critical issues and provide actionable remediation guidance. As a result of our pen tests, you’ll be able to view your applications through the eyes of both a hacker and an experienced developer to discover where you can improve your security posture.","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Physical and Social Vulnerabilities 利用物理和社会脆弱性
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch8
{"title":"Exploiting Physical and Social Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch8","DOIUrl":"https://doi.org/10.1002/9781119549420.ch8","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scripting for Penetration Testing 为渗透测试编写脚本
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch11
{"title":"Scripting for Penetration Testing","authors":"","doi":"10.1002/9781119549420.ch11","DOIUrl":"https://doi.org/10.1002/9781119549420.ch11","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122048481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Host Vulnerabilities 利用主机漏洞
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch10
{"title":"Exploiting Host Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch10","DOIUrl":"https://doi.org/10.1002/9781119549420.ch10","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129673803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Network Vulnerabilities 利用网络漏洞
Pub Date : 2018-10-18 DOI: 10.1002/9781119549420.ch7
{"title":"Exploiting Network Vulnerabilities","authors":"","doi":"10.1002/9781119549420.ch7","DOIUrl":"https://doi.org/10.1002/9781119549420.ch7","url":null,"abstract":"","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123739488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
CompTIA® PenTest+ Study Guide
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1