CompTIA PenTest+: Establishing & Maintaining Persistence
CompTIA PenTest+
| Intermediate
- 14 videos | 1h 25m 9s
- Includes Assessment
- Earns a Badge
Establishing and maintaining persistence during penetration testing (pen testing) exercises enables testers to maintain access and control over a compromised system or network even after initial access has been achieved. This is a crucial phase in the penetration test because it simulates how a real attacker might try to maintain unauthorized access over an extended period. In this course, explore how to schedule tasks and cron jobs, manually create services, and create persistent reverse shells. Next, discover how to hack with bind shells, utilize internal persistence techniques, and establish persistence using registry run keys. Finally, learn about command and control (C2) frameworks, common exploits, and tampering techniques. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline scheduling tasks and cron jobsManually create services in windowsCreate a persistent reverse shell with metasploit in kali linuxUse bind shells to gain control of a target systemCompromise machine accounts to establish domain persistenceIdentify how to obtain and use valid account credentials to establish and maintain persistence
-
Outline how registry run keys are used by malware and adversaries to establish persistenceRecognize how command and control (c2) frameworks can be leveraged to maintain access even after rebootsDifferentiate between web shells and trojansDescribe how rootkits can be used to establish and maintain access to a systemRecognize how browser extensions can be used to compromise a website's confidentiality, integrity, and availabilityOutline tampering techniques and how they can be leveraged to exploit systemsSummarize the key concepts covered in this course
IN THIS COURSE
Video Player is loading.
-
2m 14sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 27sUpon completion of this video, you will be able to outline scheduling tasks and cron jobs. FREE ACCESS
-
8m 46sDuring this video, discover how to manually create services in Windows. FREE ACCESS
-
13m 6sLearn how to create a persistent reverse shell with Metasploit in Kali Linux. FREE ACCESS
-
9m 22sIn this video, find out how to use bind shells to gain control of a target system. FREE ACCESS
-
6m 48sDiscover how to compromise machine accounts to establish domain persistence. FREE ACCESS
-
5m 54sAfter completing this video, you will be able to identify how to obtain and use valid account credentials to establish and maintain persistence. FREE ACCESS
-
7m 4sIn this video, we will outline how registry run keys are used by malware and adversaries to establish persistence. FREE ACCESS
-
5m 4sThrough this video, you will be able to recognize how command and control (C2) frameworks can be leveraged to maintain access even after reboots. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to differentiate between web shells and trojans. FREE ACCESS
-
5m 38sAfter completing this video, you will be able to describe how rootkits can be used to establish and maintain access to a system. FREE ACCESS
-
3m 48sThrough this video, you will be able to recognize how browser extensions can be used to compromise a website's confidentiality, integrity, and availability. FREE ACCESS
-
4m 26sUpon completion of this video, you will be able to outline tampering techniques and how they can be leveraged to exploit systems. FREE ACCESS
-
53sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.