TOTAL: CompTIA PenTest+ (Ethical Hacking) PT0-002 + 2 Tests
- Description
- Curriculum
- FAQ
- Reviews
Mike Meyers and the Total Seminars Team, your source for best-selling cybersecurity courses, brings you this ethical hacking and penetration testing course with your instructor Michael Solomon, Ph.D., CISSP, PMP, CISM. Prepare for the CompTIA PenTest+ PT0-002 exam.
This is NOT a boring voice over PowerPoint course. Michael speaks to you and presents the material in an engaging interactive style that will keep you interested and make it easier to understand. Check out the free sample lectures and you will see the difference.
We’ve added 2 bonus Practice Tests. One practice test covers the EC-Council Certified Ethical Hacker CEH certification exam. The other practice test covers the CompTIA PenTest+ certification exam. Test your readiness to pass either of these industry ethical hacking certification exams.
With 30+ years of experience in security, privacy, blockchain, and data science, and an energetic presentation style, Michael takes his proficiency in network penetration testing and consolidates it into this informative and engaging course.
WHY SHOULD I TAKE THIS COURSE?
Did you know penetration testers’ average salary is 71,929?* And this career is in one of the fastest-growing job markets.
Whether you’re looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you’re just looking to learn some awesome ethical hacking skills, you’re in the right place.
Keep in mind there’s much more to being an ethical hacker than what’s covered here, including how to secure a network, however this course focuses on how to be a pen tester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.
This course shows you how to:
-
Use the tools you’ll need to scan networks, crack passwords, analyze and intercept traffic, discover code vulnerabilities, and compromise resources
-
Recognize vulnerabilities within a system, run exploits, and suggest solutions to a client to remediate the weak points
-
Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, and DVWA
-
Scope, plan, and execute a pen test engagement from start to finish
WHAT’S COVERED?
PenTest+ Exam Domain – Percentage of Exam
1.0 Planning and Scoping – 14%
-
Compare and contrast governance, risk, and compliance concepts
-
Explain the importance of scoping and organizational/customer requirements
-
Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity
2.0 Information Gathering and Vulnerability Scannings 22%
-
Given a scenario, perform passive reconnaissance
-
Given a scenario, perform active reconnaissance
-
Given a scenario, analyze the results of a reconnaissance exercise
-
Given a scenario, perform vulnerability scanning
3.0 Attacks and Exploits – 30%
-
Given a scenario, research attack vectors and perform network attacks
-
Given a scenario, research attack vectors and perform wireless attacks
-
Given a scenario, research attack vectors and perform application-based attacks
-
Given a scenario, research attack vectors and perform attacks on cloud technologies
-
Explain common attacks and vulnerabilities against specialized systems
-
Given a scenario, perform a social engineering or physical attack
-
Given a scenario, perform post-exploitation techniques
4.0 Reporting and Communications 18%
-
Compare and contrast important components of written reports
-
Given a scenario, analyze the findings and recommend the appropriate remediation within a report
-
Explain the importance of communication during the penetration testing process
-
Explain post-report delivery activities
5.0 Tools and Code Analysis 16%
-
Explain the basic concepts of scripting and software development
-
Given a scenario, analyze a script or code sample for use in a penetration test
-
Explain use cases of the following tools during the phases of a penetration test
EXAM INFO
Exam code: PT0-002
Max. 85 questions (performance-based and multiple choice)
Length of exam: 165 minutes
Passing score: 750 (on a scale of 100-900)
Exam voucher cost: 381USD
Recommended experience: Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
HOW DO I TAKE THE COMPTIA PENTEST+ EXAM?
Buy an exam voucher (get your discount voucher at Total Seminars’ website), schedule your exam on the Pearson VUE website, then take the exam at a qualifying Pearson VUE testing center.
WHAT’S THE BIG DEAL ABOUT THE COMPTIA PENTEST+, ANYWAY?
CompTIA’s PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center or online, with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems.
Penetration testing and information security is one of the fastest-growing job categories according to the U.S. Bureau of Labor Statistics. It predicts that roles requiring these skills will see 28 percent overall growth by 2026.
COMPTIA PENTEST+ VS. EC-COUNCIL CEH CERTIFICATIONS
The CompTIA PenTest+ is your quickest and most cost-effective route to a pen testing certification
The PenTest+ includes the latest mobile and cloud penetration testing skills, including IoT, as well as traditional desktop & server systems (CEH covers only traditional desktop & server systems)
The PenTest+ better matches employer needs by covering not just technical topics, but also business processes, project flow, best practices, and professionalism in pen testing (CEH is strictly technical)
The PenTest+ exam voucher costs 381USD (compared to the CEH 1,150USD non-member plus application fee)
Take a look at these student reviews:
– “This is an excellent course!! Even in earlier chapters, the instructor gets you going on sample exercises to chop up the theoretical content a little, which always helps. With a course like this, hands-on is everything. I also appreciate that the theoretical parts are NOT TOO LONG AT ONCE!! Total Seminars did a fantastic job of breaking the content up in just the right places. LOVE this course!” – Chris N
– “Amazing. Well Explained. Detail description for all the fundamental terms.” – Nisarg T
– “Instruction was excellent. Including notes as resources was a big help! I reviewed the notes while watching the videos and I think that is really going to help me with information retention. The instructor used real-world examples to demonstrate points. Overall, I feel confident I can pass the test after studying the materials and doing the exercises the instructor emphasizes. The instructor also highlighted several key points to study for the exam for maximum preparation.” – Tim W
– “This is what I was hoping for and it’s much more upbeat than most of the lulling video series’ I’ve seen before.” – John G
– “This course covers everything in the approved CompTIA PenTest+ certification test. The presenter knows his stuff, has done real work pentests and does a good job of showing off the tools you’ll be quizzed on and how to manipulate and analyze the results. Highly recommend this for anyone with Security+ that is looking to specialize as a pentester. Great place to start!” – Casey D
– “Very well thought out course. The instructor is very knowledgeable, and the course is laid out in a great way! A lot of time was put into this and it shows!” – Luke P
-
1Introduction to the CompTIA PenTest+ (PT0-002) CourseVideo lesson
Michael talks about what is covered in the course. He explains what is covered on the CompTIA PenTest+ exam and gives an overview of the Ethical Hacking topics covered in the course.
-
2About the CompTIA PenTest+ (PT0-002) ExamVideo lesson
All About the CompTIA PenTest+ (PT0-002) Exam.
-
3Planning a Pen TestVideo lesson
Pen tests are large projects and must be planned for accordingly, or else it’s easy for them to get out of scope and become more work than you initially thought. Understand the importance of planning and scoping an engagement using strategy, project management skills, and pen testing resources.
-
4Rules of EngagementVideo lesson
Pen tests are risky at best and can violate security rules or even legislation at worst. Learn how to establish rules of engagement with your client including understanding who they are, what the target limits are, what the test scope is, and who to communicate with should something go awry during one of your attacks.
-
5Regulatory ComplianceVideo lesson
Legialative bodies and indurtry organizations may require certain organizations comply with requirements to avoid sanctions or carry out business functions. Pen testing is one way to determine if an organization's policies and controls comply with pertinent requirements. Two common compliance requirements that mandate pen tests are PCI DSS and GDPR.
-
6Resources and BudgetVideo lesson
There are important factors to consider before you even begin your first attack. Planning out and discussing the resources, requirements, and budget with the client is key to a successful engagement. You need to consider who will provide the resources, like the hardware and software, since each of these costs money. Establish the budget from the beginning and assign a value to every part of the test, including the cost of your time.
-
7Impact and ConstraintsVideo lesson
A pen test is more than just a simple test; it’s a large-scale engagement. Before you begin, you need to explain to your client what the impact of the tests might be. If they have any constraints, such as not attacking a production server, they should make you aware of them since the result could be catastrophic for the business if it went down during one of your attacks.
-
8Support ResourcesVideo lesson
It’s important to know what resources you can use to be able to successfully attack your targets. This is where software development tools come in handy, since they can shed light on the inner workings of an application, giving you the opportunity to exploit a possible vulnerability. Learn about WSDLs, WADLs, SOAP project files, SDK, swagger, and XSD documentation, sample application requests, and the importance of network architectural diagrams.
-
9Legal GroundworkVideo lesson
Many activities in a pen test are technically against the rules and policies, or even illegal. You need to make sure you’re covered legally so you don’t get in trouble for doing something during an attack that your client isn’t aware of. This video covers the basics of SOWs, MSAs, and NDAs, the differences between environments, nations, cultures, and corporations, and getting written permission to perform the tests so you don’t get in to trouble later.
-
10Service Provider AgreementsVideo lesson
A Service Level Agreement (SLA) is an agreement between a customer and a service provider that should include both requirements and limitations on pen testing activities.
-
11Standards and Methodologies, Part 1Video lesson
A comprehensive pen test is one that addresses as many aspects of an IT infrastructure as possible and satisfies all of the testing requirement goals. Using an industry accepted pen testing standard an methodology helps pen testers to avoind missing critical areas. Two common pen testing frameworks are the MITRE ATT&CK framework and the OWASP resources.
-
12Standards and Methodologies, Part 2Video lesson
Several organizations publish standards for pen testing to help pen testers plan exhaustive tests, including NIST standards and frameworks, OSSTMM. PTES, and ISSAF.
-
13Environmental and Scoping ConsiderationsVideo lesson
When scoping pen testing activities, planners should consider the environment in which test will run, including network architecture, applications running, cloud versus on-premises components, off-limits components or segments, and the type of assessment to be performed.
-
14Ethical MindsetVideo lesson
Since pen testers possess the skills and tools to carry out attacks that could cause substantial damage, it is important to require the utpost ethical behavior from all pen test team members.
-
15Lab Environment SetupVideo lesson
This video walks you through how to create a lab environment where you can practice your pen testing skills. Learn how to set up the virtual machine manager Oracle VirtualBox and install virtual machines within it including the toolkit of all toolkits, Kali Linux, and two intentionally vulnerable VMs where you can practice attacking a system, called Damn Vulnerable Web App (DVWA) and Metasploitable.
-
16Project Strategy and RiskVideo lesson
A black-box pen tester is someone who knows nothing going into the engagement, and a white-box pen tester is more like a company insider who has a certain amount of knowledge before they begin. Whichever way you plan to play the role, these are some of the considerations you’ll need to figure out before you begin your pen testing. Are you whitelisted or blacklisted? Do you know the layers of security controls your client has? How invasive will the test be? Learn the nuances of how to strategize your engagement and prepare the client for the possible risks involved.
-
17Scope VulnerabilitiesVideo lesson
As you continue to plan out your pen test, you’ll need to lock in the schedule and make sure you won’t run into scope creep. You’ll also want to hone in on what type of attacker you are and what your motivations are for attacking. Are you an advanced persistent threat with lots of resources? Or perhaps a script kiddie, hacktivist, or an insider threat? With all this information, you can build your threat model, a valuable map for what assets you’re going to use and what specific targets you will be attacking that will help guide you through the next steps in your pen test.
-
18Compliance-Based AssessmentsVideo lesson
Compliance-based assessments are a bit different than any other type in that standards and regulations outside the client’s control can change how a pen test must be conducted. Learn how to recognize some of these constraints and how to incorporate them into your pen test plan.
-
19Chapter 1 QuizQuiz
-
20Scanning and EnumerationVideo lesson
It’s important to survey the environment and gather all the correct information to determine where any vulnerabilities might lie. By using techniques such as scanning and enumeration, you’ll know exactly where the weak points are on a network and how to classify them in order to launch the appropriate attacks.
-
21Scanning DemoVideo lesson
Now that you know what surveying and enumeration are, it’s time to put that knowledge into action. Running Metasploitable on a virtual box, you will learn how to use, Nmap, ping sweep scan, ARP Scan, and whois lookup to determine which targets are the easiest to get to.
-
22Packet InvestigationVideo lesson
If you don’t get a response from a host after an initial scan, you can use additional tools to find out more information. Learn how to use packet crafting to create specific network packets to gather or carry out attacks. Also use packet inspection, fingerprinting, cryptography, and eavesdropping to gather information and determine what traffic is being sent.
-
23Packet Inspection DemoVideo lesson
Many functions of a pen test are only as good as the tools you have available to you. In conjunction with Metasploitable, learn how to use Wireshark, a free and useful application for information gathering and packet inspection, to break down exactly what’s happening inside each packet sent through the network.
-
24Labtainers SetupVideo lesson
Labtainers is a self-contained open-source cybersecurity lab environment with dozens of hands-on labs that are easy to access. We will use the labtainers environment for the labs you will explore throughout this course.
-
25Labtainers Lab (Wireshark)Video lesson
The wireshark labtainers lab introduces students to th eprocess of analyzing network traffic using the freely available Wireshark tool.
-
26Application and Open-Source ResourcesVideo lesson
Sometimes, to go forward, you must go backward. Understand how you can use code decompiling and debugging to work backwards and learn a program’s secrets and weaknesses to determine the best way to exploit them. Learn the resources you can use to dig into web application code and how that information can benefit you when planning your attacks.
-
27Passive ReconnaissanceVideo lesson
Before launching any attacks, an effective pen tester learns about the target environment by carying out reconnaissance on the environment to identify potential weaknesses. Passive reconnaissance describes activities in which the pen tester uses external resources to learn about a potential victim.
-
28Active ReconnaissanceVideo lesson
Another part of the reconnaissance process is digging into a target's infrastructure to learn more than external resources may yield. Active reconnaissance describes the process of querying a target envirnment's resoources and sending specially crafted network packets to examine any responses. Active reconnaissance is easier for a target to detect but often yields better information that a pen tester can use to device an effective attack plan.
-
29Vulnerability ScanningVideo lesson
There is no shortage of known vulnerabilities on any computing devices, but how do you match known vulnerabilities with your target's weaknesses? By applying a structured approach, you can find out if specific vulnerabilities exist on a target. Learn about discovery scans, full scans, port scans, stealth scans, and compliance scans.
-
30Vulnerability Scanning DemoVideo lesson
Now that you know the various methods for testing vulnerabilities, see exactly how to use stealth scanning, port scanning, OS fingerprinting, and OpenVas to assess vulnerabilities.
-
31Labtainers Lab (Network Basics)Video lesson
The Network Basics labtainers lab introduces students to basic networking concepts and protocols, including ARP, ping, and TCP/IP.
-
32Labtainers Lab (Nmap Discovery)Video lesson
The nmap Discovery labtainers lab introduces students to the nmap utility and how to use nmap to locate an ssh server on a network and also to discover the port numbre being used by the service.
-
33Target ConsiderationsVideo lesson
There are some very important considerations to take into account when planning an attack. Learn the importance of finding out whether you’re attacking a physical machine, virtual machine, or container and what the best analysis tool is to use. Learn how to map targets to business value so you can focus on what vulnerability will hurt the business the worst.
-
34Analyzing Scan OutputVideo lesson
Collecting intelligence about a potential target is only the first step. A pen tester must also be able to analyze the output from reconnaissance activities. Understanding what recinnaissance output contains is a critical part of selecting efective attacks in pen test planning.
-
35Nmap Scoping and Output OptionsVideo lesson
As a pen tester, the nmap command will be one of your greatest tools. It is a network mapper with numerous options. Learn how to detect the operating system of a machine, conduct stealthy scans, determine the service and version information, enumerate targets, and output the scan results into several different file formats.
-
36Nmap Timing and Performance OptionsVideo lesson
Being fast is normally great, but as a pen tester fast can mean creating a lot of network traffic, unintentionally alerting your target that something is happening. When you need to fly under the radar, use Nmap (along with helpful cheat sheet), to help you stealthily apply your vulnerability scans so there’s less chance of being detected.
-
37Prioritization of VulnerabilitiesVideo lesson
You’ve ranked your assets, vulnerabilities, and exploits, now it’s time to make a priorities list and leverage that information to plan your penetration tests. Use powerful Nmap scripts to map those vulnerabilities to potential exploits.
-
38Common Attack TechniquesVideo lesson
There are many pen testing techniques and often they are used together to successfully attack a target. Learn some of the more common attack techniques such as exploit modification, exploit chaining, social engineering, credential brute forcing, and enlightened attacks.
-
39Automating Vulnerability ScansVideo lesson
Since many pen testing activities are interative and are repeated multiple times with slight input variations, automating as much of the pen tests as possible increases efficiency and reduces human errors. Explore options to automate any tests that are part of a pen test plan.
-
40Credential AttacksVideo lesson
This video walks you through the process of a brute force attack. With a list of usernames and passwords, and an ip address and a port number, you will see how the Hydra tool can help you become an authorized user.
-
41Labtainers Lab (Password Cracking)Video lesson
The Password Cracking labtainers lab introduces students to passowrd basics and how to carry out elementary password cracking attacks.
-
42Labtainers Lab (Secure Socket Layers)Video lesson
The Secure Socket Layers labtainers lab introduces students to the use of SSL to authenticate both sides of a connection, including creating and signing certificates using a CA.
-
43Labtainers Lab (Routing Basics)Video lesson
The Routing Basics labtainers lab introduces students to a simple routing example with two LANs and an Internet connection via NAT.
-
44Chapter 2 QuizQuiz
-
45Exploit Resources and Network AttacksVideo lesson
Effective pen tests are those developed from the most comprehensive planning efforts possible. Pen testers should incorporate as many exploit resources, such as exploit databases and online resources as possible. Having a large repository of exploit input information makes it easier to chain exploits together and carry out more sophisticated attacks, such as network password attacks.
-
46Network-Based ExploitsVideo lesson
This video covers a high-level overview of the various network-based protocols and their vulnerabilities. These include NETBIOS Name Service (NBNS), LLMNR (Link-Local Multicast Name Resolution), DNS and ARP poisoning, SMB (Server Message Block), SNMP (Simple Network Management Protocol), SMTP (Simple Mail Transport Protocol), and FTP (File Transfer Protocol).
-
47FTP Exploit DemoVideo lesson
In this video, learn how to launch an FTP attack in Kali Linux. You’ll start by using the vulscan option in nmap to identify vulnerabilities within specific ports and IP addresses. Then explore the databases in the Metasploitable Framework to find the specific exploit you’ll want to use. Finally, you’ll launch the Metasploitable Framework Console, type in a few commands, and let Kali execute the exploit for you as you sit back and watch the pen testing magic happen.
-
48Man-in-the-middle ExploitsVideo lesson
You don’t have to be on the client or the server side to exploit a target. Man-in-the-middle attacks put the attacker in between the communication as a proxy to steal the network packets as they’re passed back and forth. These include DNS cache poisoning, ARP spoofing, pass the hash, replay, relay, SSL stripping, downgrading, DoS, NAC bypass, and VLAN hopping.
-
49Labtainers Lab (TCP/IP Attacks)Video lesson
The TCP/IP Attacks labtainers lab introduces students to TCP/IP protocol vulnerabilities, including SYN flooding, RST attacks and session hijacking.
-
50Labtainers Lab (ARP Spoof Attacks)Video lesson
The ARP Spoof Attack labtainers lab introduces students to the use of ARP spoofing for Man-in-the-middle attacks.
-
51Labtainers Lab (Local DNS Attacks)Video lesson
The Local DNS Attacks labtainers lab introduces students to DNS spoofing and cache poisoning on a local area network.
-
52Labtainers Lab (MACs and Hash Functions)Video lesson
The MACs and Hash Functions labtainers lab introduces students to cryptographic hashes and the potential for hash collisions.
-
53Chapter 3 QuizQuiz
-
54Wireless ExploitsVideo lesson
Because wireless communication uses broadcast technology, essentially sending your data packets in every direction for anyone to grab, it makes it a great target for attackers. Learn how to use tools like Aircrack-ng and Wireshark to sniff and grab packets. Also understand the different types of attacks available to you, such as evil twin, deauthentication, fragmentation, credential harvesting, exploiting WPS weaknesses, Bluejacking, Bluesnarfing, RFID cloning, jamming, and repeating.
-
55Wireless Exploits, Part 2Video lesson
As more and more users depend on wireless communications to connect to network resources, attacker have developed more sophisticated attacks on wireless networks. Some newer wireless attacks include those focused on data modification, data corruption, capturing handshakes, and on-path, or man-in-the-middle attacks.
-
56AntennasVideo lesson
Regardless of the hwrdware and software used in wireless pen tests, the right antenna can increase the chance of a successful network compromise. Purpose-built and amplified antennas can allow a pen tester to attack a network from farther away than when using off-the-shelf wireless adapters.
-
57Chapter 4 QuizQuiz
-
58OWASP Top 10Video lesson
The OWASP Top Ten is a list of the top ten most commonly encountered web application risks. Understanding and recognizing the most common errors helps pen testers select attack that have a higher than average chance of success.
-
59Application Exploits, Part 1Video lesson
Applications are great targets to attack, especially if you’re trying to disrupt communication with DoS, or if you’re looking to exfiltrate or destroy data. This video covers injection attacks, which is essentially inserting additional data beyond what the application is expecting to make it give you some information or perform some action for you. These include SQL, HTML, command, and code injection attacks.
-
60SQL Injection DemoVideo lesson
As a pen tester, you can get web apps to give you all kinds of information by leveraging mistakes developers make during the development phase. After configuring your DVWA to make sure it’s extra vulnerable, you’ll learn how to type commands into a seemingly benign data form box to make the web app respond back with extra database information, and even run a script to make a dialogue box appear.
-
61Labtainers Lab (SQL Injection)Video lesson
The SQL Injection labtainers lab introduces students to SQL injection attacks and countermeasures.
-
62Application Exploits, Part 2Video lesson
The beauty of applications is they already have access to databases, all you have to do is figure out how to exploit the vulnerabilities to get to that information. This video covers authentication attacks such as credential brute forcing, session hijacking, redirecting, as well as exploiting default or weak credentials and Kerberos tickets. It also covers authorization attacks such as parameter pollution and insecure direct object reference.
-
63Application Exploits, Part 3Video lesson
In this final episode describing application exploits, you’ll learn about another application injection attacks called cross-site scripting (XSS) which attacks the server, and its similar cousin, cross-site request forgery (XSRF/CSRF) that attacks the user. You’ll also discover how to launch passive attacks just by exploiting security misconfigurations, including directory traversal errors, cookie manipulation, and file inclusion.
-
64Cross-Site Scripting DemoVideo lesson
Pen testing is often trying one thing, tweaking it, and trying again. Back in our lab environment, you’ll see a cross-site scripting (XSS) attack carried out using Kali Linux and the Damn Vulnerable Web App (DVWA).
-
65Labtainers Lab (Cross-Site Scripting)Video lesson
The Cross--Site Scripting labtainers lab introduces students to cross site scripting (XSS) attacks on a vulnerable web server.
-
66Labtainers Lab (Cross-Site Request Forgery)Video lesson
The Cross-Site Request Forgery labtainers lab introduces students to Cross Site Request Forgery (CSRF) attacks with a vulnerable web site.
-
67Code VulnerabilitiesVideo lesson
There’s more to pen testing than exploits and vulnerabilities, a good pen tester has a broad knowledge base of computer systems as well. Part of that is a general understanding of how applications are coded. When developers write applications, they may use practices that make it easier for them to write code, but also make the application unsecure. In this episode, you will learn what some of those common unsecure code practices are.
-
68API Attacks and Attack ResourcesVideo lesson
Increased reliance on distributed applications means more API use, and more vulnerabilities related to APIs. Pen testers should understand RESTful, XML-RPC, and SOAP API weaknesses and attacks, and understand how to use resources such as word lists in attacking srvices.
-
69Privilege Escalation (Linux)Video lesson
In order to access systems and files in Linux, you need privileges. One way to do that is to leverage Linux’s SUID (Set User ID) and SGUID (Set Group ID) capabilities. In this episode, you’ll find out ways to escalate your privilege using various executables.
-
70Privilege Escalation (Windows)Video lesson
Windows OS also has issue of privilege escalation. As a pen tester, you can use this to your advantage by finding ways to access credentials stored in Cpassword, LDAP, LSASS, and SAM databases, among others. You can also take exploit Kerberos tickets by Kerberoasting, or force malicious DLL modules to load with DLL hijacking.
-
71Misc. Privilege EscalationVideo lesson
There are a few other Windows OS vulnerabilities you can exploit to gain higher levels of privileges. In this video, you’ll learn about unquoted services paths and writable services in Windows Services. You’ll also learn the weaknesses of applications as well as another tricky way to access credentials: using a keylogger.
-
72Misc. Local Host VulnerabilitiesVideo lesson
Continuing the conversation on possible vulnerabilities you can exploit as a pen tester, you’ll learn about how often default accounts are rarely changed or disabled, making them a perfect target to attack. Yet another way to gain access is to escape sandbox environments such as VMs and containers. Finally, you’ll learn about physical device security such as cold boot attacks, JTAG debuggers, and serial consoles.
-
73Chapter 5 QuizQuiz
-
74Cloud Attacks, Part 1Video lesson
Cloud computing is more popular and complex than ever, and attacks on cloud environments are more prevalent than in the past. Pen testers should be familiar with common cloud attacks including credential harvesting, privilege escalation, account takeover, metadat service attacks, and misconfigured cloud assets.
-
75Cloud Attacks, Part 2Video lesson
In addition to an awareness of general cloud attacks, pen testers should be familiar with specific cloud environment attacks including resource exhaustion, cloud malware injection, DoS, side-channel, and direct-to-origin attacks.
-
76Chapter 6 QuizQuiz
-
77Mobile AttacksVideo lesson
Mobile devices have unique characteristics and unique vulnerabilities that could lead to successful attacks. To help protect mobile devices you'll learn about reverse engineering, sandbox analysis, spamming, other mobile-specific attacks and tools that can help assess and secure mobile devices.
-
78IoT AttacksVideo lesson
IoT popularity has exploded and so have potential attacks on these often vulnerable devices. Pen testers need to understand BLE attacks, fragility and availability concerns, data corruption and exfiltration attacks, and other IoT-specific vulnerabilities.
-
79Data Storage and Management Interface AttacksVideo lesson
Data storage systems may look like generic computers of devices, but they often have their own types of vulnerabilities that attackers can exploit. In this section you'll learn about data storage misconfigurations, lack of input sanitization, software and exception handling issues, injection vulnerabilities, as well as vunerabilities that are specific to IPMI systems.
-
80Virtual and Containerized Environment AttacksVideo lesson
Virtualization is a foundation of today's IT environment, both as the basis of cloud computing, as well as in common use within organizations and even on personal computers. In this section you'll learn about virtualization vulnerabilities, including VM escape, hypervisor vulnerabilities, VM repository vulnerabilities, and vulnerabilities related to containerized workloads.
-
81Labtainers Lab (Industrial Control System)Video lesson
The Industrial Control System labtainers lab introduces students to using the GrassMarlin tool to view traffic you generate interacting with a PLC.
-
82Chapter 7 QuizQuiz
-
83Pretext for a Social Engineering AttackVideo lesson
Although well-executed social engineering attacks can be some of the most devastating attacks to any organization, they aren't always the best choice. An important step in planning any social engineering attack is determining whether such an attack makes sense. In this section you'll learn about identifying the proper pretext that least to a successful social engineering attack.
-
84Remote Social EngineeringVideo lesson
Social engineering takes advantages of one of the greatest vulnerabilities of a client – the people who work there. As a pen tester, one of the easiest ways to gain access is by tricking authorized users into giving up sensitive information. Learn about the basics of phishing, including spear phishing, SMS phishing and whaling.
-
85Spear Phishing DemoVideo lesson
Now that you understand what social engineering attacks are, learn how to use Kali Linux to launch a mass email spear phishing attack with a few simple commands.
-
86In-Person Social EngineeringVideo lesson
In-person social engineering attacks are usually successful because people often want to be helpful and will rarely say “no” to someone face-to-face. These include elicitation, interrogation, impersonation, shoulder surfing, and USB key drops. It’s also important to include multiple elements of what motivates people to give up sensitive information such as authority, scarcity, social proof, urgency, likeness, and fear.
-
87Physical SecurityVideo lesson
We’ve explored many of the technical ways to infiltrate a system through the network or directly at the host level. Physical security, on the other hand, involves gaining access to the actual physical location and the data within it by tailgating, fence jumping, dumpster diving, lock picking, or bypassing locks.
-
88Chapter 8 QuizQuiz

External Links May Contain Affiliate Links read more