Post-Exploit Tasks for CompTIA PenTest+
Offered By: Pluralsight
Course Description
Overview
This course (part 9 in the PenTest+ series) focuses on methods of evading security countermeasures, maintaining access and covering your tracks.
You have identified the big computing assets that an enterprise wants to keep protected — networks, hosts, and applications — and have done what you can to exploit their vulnerability. This is the core phase of any penetration testing engagement, but you are not done. You need to engage in post-exploitation activities to escape security countermeasures and maintain a foothold in the organization, long though the main actions have been accomplished. In this course, Post Exploit Tasks for CompTIA PenTest+, you will gain understanding of the steps and techniques that you can use during this phase and the engagement. First, you will learn different lateral movement techniques that allow you make the most impact of the exploits you have already discovered. Once you understand this, you will learn about pivoting through port forwarding, VPNs, SSH, and others. Next, you will explore the different ways you can maintain persistence within the target network without drawing much attention to your self. Finally, you will use specific anti-forensics techniques to avoid software that is designed to catch you and your activities When you are finished with this course, you will have the skills and knowledge of penetration tester needed to complete your post-exploit tasks on any any engagement. Software required: [software required.] * * Setting up the Lab environment from the "Laying the Foundation for Penetration Testing for CompTIA PenTest+" course.
You have identified the big computing assets that an enterprise wants to keep protected — networks, hosts, and applications — and have done what you can to exploit their vulnerability. This is the core phase of any penetration testing engagement, but you are not done. You need to engage in post-exploitation activities to escape security countermeasures and maintain a foothold in the organization, long though the main actions have been accomplished. In this course, Post Exploit Tasks for CompTIA PenTest+, you will gain understanding of the steps and techniques that you can use during this phase and the engagement. First, you will learn different lateral movement techniques that allow you make the most impact of the exploits you have already discovered. Once you understand this, you will learn about pivoting through port forwarding, VPNs, SSH, and others. Next, you will explore the different ways you can maintain persistence within the target network without drawing much attention to your self. Finally, you will use specific anti-forensics techniques to avoid software that is designed to catch you and your activities When you are finished with this course, you will have the skills and knowledge of penetration tester needed to complete your post-exploit tasks on any any engagement. Software required: [software required.] * * Setting up the Lab environment from the "Laying the Foundation for Penetration Testing for CompTIA PenTest+" course.
Taught by
Dale Meredith
Related Courses
CompTIA Security+ Course CertificationCybrary CompTIA Security+ Certification Training - SY0-601
Edureka Become a CompTIA Advanced Security Practitioner (CASP+)
LinkedIn Learning Become a CompTIA Certified Penetration Tester (PenTest+)
LinkedIn Learning Become a CompTIA Cybersecurity Analyst (CySA+ CS0-002)
LinkedIn Learning