CompTIA PenTest+: Host-Based Attacks
CompTIA PenTest+
| Intermediate
- 11 videos | 1h 40m 13s
- Includes Assessment
- Earns a Badge
Conducting host-based attacks during a penetration testing (pen testing) exercise requires careful planning and authorization to ensure it's done ethically and legally. Penetration testers need to be aware of the multitude of host based attack types and how to execute them using the appropriate tools. In this course, you'll explore a variety of host based attacks including privileged escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering. Next, you'll explore tools used to carry out host-based attacks including Mimikatz, Rubeus, Certify, Seatbelt, PowerShell, PsExec, Evil-WinRM, and Living Off the Land. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of host-based attack types including privilege escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tamperingUse mimikatz to perform a pass-the-hash attackDemonstrate how to attack kerberos using rubeusUse certipy to attack active directory certificate servicesDemonstrate how to use seatbelt to perform security oriented host-survey safety checks
-
Use psexec to detect privilege escalationDemonstrate how to perform attacks using powershellUse evil-winrm to perform host-based attacksPerform living off the land binaries (lolbins) host-based attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 19sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 25sUpon completion of this video, you will be able to provide an overview of host-based attack types including privilege escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering. FREE ACCESS
-
9m 18sIn this video, find out how to use Mimikatz to perform a pass-the-hash attack. FREE ACCESS
-
6m 59sIn this video, we will demonstrate how to attack Kerberos using Rubeus. FREE ACCESS
-
17m 39sLearn how to use Certipy to attack Active Directory Certificate Services. FREE ACCESS
-
12m 32sIn this video, we will demonstrate how to use Seatbelt to perform security oriented host-survey safety checks. FREE ACCESS
-
10m 23sIn this video, you will learn how to use PSEXEC to detect privilege escalation. FREE ACCESS
-
14m 54sIn this video, we will demonstrate how to perform attacks using PowerShell. FREE ACCESS
-
9m 43sDuring this video, discover how to use Evil-WinRM to perform host-based attacks. FREE ACCESS
-
9m 1sIn this video, discover how to perform Living Off the Land binaries (LOLbins) host-based attacks. FREE ACCESS
-
1m 1sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.