CompTIA PenTest+: Establishing & Maintaining Persistence

CompTIA PenTest+    |    Intermediate
  • 14 videos | 1h 25m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 10 users Rating 4.2 of 10 users (10)
Establishing and maintaining persistence during penetration testing (pen testing) exercises enables testers to maintain access and control over a compromised system or network even after initial access has been achieved. This is a crucial phase in the penetration test because it simulates how a real attacker might try to maintain unauthorized access over an extended period. In this course, explore how to schedule tasks and cron jobs, manually create services, and create persistent reverse shells. Next, discover how to hack with bind shells, utilize internal persistence techniques, and establish persistence using registry run keys. Finally, learn about command and control (C2) frameworks, common exploits, and tampering techniques. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline scheduling tasks and cron jobs
    Manually create services in windows
    Create a persistent reverse shell with metasploit in kali linux
    Use bind shells to gain control of a target system
    Compromise machine accounts to establish domain persistence
    Identify how to obtain and use valid account credentials to establish and maintain persistence
  • Outline how registry run keys are used by malware and adversaries to establish persistence
    Recognize how command and control (c2) frameworks can be leveraged to maintain access even after reboots
    Differentiate between web shells and trojans
    Describe how rootkits can be used to establish and maintain access to a system
    Recognize how browser extensions can be used to compromise a website's confidentiality, integrity, and availability
    Outline tampering techniques and how they can be leveraged to exploit systems
    Summarize the key concepts covered in this course

IN THIS COURSE

Video Player is loading.
Current Time 0:00
Duration 0:00
Stream Type LIVE
Loaded: 0%
 
  • 2m 14s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 27s
    Upon completion of this video, you will be able to outline scheduling tasks and cron jobs. FREE ACCESS
  • Locked
    3.  Creating New Services
    8m 46s
    During this video, discover how to manually create services in Windows. FREE ACCESS
  • Locked
    4.  Creating Persistent Reverse Shells
    13m 6s
    Learn how to create a persistent reverse shell with Metasploit in Kali Linux. FREE ACCESS
  • Locked
    5.  Hacking with Bind Shells
    9m 22s
    In this video, find out how to use bind shells to gain control of a target system. FREE ACCESS
  • Locked
    6.  Enabling Domain Persistence
    6m 48s
    Discover how to compromise machine accounts to establish domain persistence. FREE ACCESS
  • Locked
    7.  Internal Persistence Techniques
    5m 54s
    After completing this video, you will be able to identify how to obtain and use valid account credentials to establish and maintain persistence. FREE ACCESS
  • Locked
    8.  Persistence Using Registry Run Keys
    7m 4s
    In this video, we will outline how registry run keys are used by malware and adversaries to establish persistence. FREE ACCESS
  • Locked
    9.  Command and Control (C2) Frameworks
    5m 4s
    Through this video, you will be able to recognize how command and control (C2) frameworks can be leveraged to maintain access even after reboots. FREE ACCESS
  • Locked
    10.  Backdoor Exploits
    5m 40s
    Upon completion of this video, you will be able to differentiate between web shells and trojans. FREE ACCESS
  • Locked
    11.  Rootkit Exploits
    5m 38s
    After completing this video, you will be able to describe how rootkits can be used to establish and maintain access to a system. FREE ACCESS
  • Locked
    12.  Browser Extensions
    3m 48s
    Through this video, you will be able to recognize how browser extensions can be used to compromise a website's confidentiality, integrity, and availability. FREE ACCESS
  • Locked
    13.  Tampering Security Controls
    4m 26s
    Upon completion of this video, you will be able to outline tampering techniques and how they can be leveraged to exploit systems. FREE ACCESS
  • Locked
    14.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Rating 4.4 of 11 users Rating 4.4 of 11 users (11)