CompTIA PenTest+: Authentication Attacks

CompTIA PenTest+    |    Intermediate
  • 11 videos | 1h 22m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 9 users Rating 4.4 of 9 users (9)
Penetration testing (pen testing) often involves assessing the security of authentication mechanisms within a system. In this course, discover how to perform authentication attacks using the appropriate tools given various scenarios, beginning with how to exploit multifactor authentication fatigue and Kerberos and LDAP injection attacks. Next, explore pass-the-hash, pass-the-ticket, and pass-the-token attacks, as well as brute forcing, mask attacks, password spraying, and credential stuffing. Finally, learn about OpenID Connect attacks, how to perform SAML attacks, and explore common tools used to perform authentication attacks, including Responder, hashcat, John the Ripper, Hydra, BloodHound, Medusa, and Burp Suite. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between different authentication attacks
    Dump and crack ntlm hashes using crackmapexec
    Intercept windows credentials using responder
    Crack passwords using hashcat
    Crack ssh private key passwords using john the ripper
  • Use hydra to brute force login pages
    Use bloodhound to perform active directory attacks
    Use medusa to crack passwords
    Use the burp suite to perform broken authentication attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 15s
    After completing this video, you will be able to differentiate between different authentication attacks. FREE ACCESS
  • Locked
    3.  Cracking NTLM Hashes Using CrackMapExec
    11m 14s
    Learn how to dump and crack NTLM hashes using CrackMapExec. FREE ACCESS
  • Locked
    4.  Intercepting Credentials Using Responder
    9m 29s
    During this video, discover how to intercept Windows credentials using Responder. FREE ACCESS
  • Locked
    5.  Cracking Passwords Using Hashcat
    9m 46s
    In this video, find out how to crack passwords using hashcat. FREE ACCESS
  • Locked
    6.  Cracking SSH Key Passwords Using John the Ripper
    4m 40s
    In this video, you will learn how to crack SSH private key passwords using John the Ripper. FREE ACCESS
  • Locked
    7.  Using Hydra to Brute Force Login Pages
    13m 26s
    Find out how to use Hydra to brute force login pages. FREE ACCESS
  • Locked
    8.  Performing Active Directory Attacks Using BloodHound
    9m 17s
    Discover how to use BloodHound to perform Active Directory attacks. FREE ACCESS
  • Locked
    9.  Cracking Passwords Using Medusa
    7m 49s
    During this video, you will learn how to use Medusa to crack passwords. FREE ACCESS
  • Locked
    10.  Performing Broken Authentication Attacks Using Burp Suite
    5m 39s
    In this video, discover how to use the Burp Suite to perform broken authentication attacks. FREE ACCESS
  • Locked
    11.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.2 of 10 users Rating 4.2 of 10 users (10)
Rating 4.4 of 11 users Rating 4.4 of 11 users (11)