CompTIA PenTest+: Host-Based Attacks

CompTIA PenTest+    |    Intermediate
  • 11 videos | 1h 40m 13s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Conducting host-based attacks during a penetration testing (pen testing) exercise requires careful planning and authorization to ensure it's done ethically and legally. Penetration testers need to be aware of the multitude of host based attack types and how to execute them using the appropriate tools. In this course, you'll explore a variety of host based attacks including privileged escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering. Next, you'll explore tools used to carry out host-based attacks including Mimikatz, Rubeus, Certify, Seatbelt, PowerShell, PsExec, Evil-WinRM, and Living Off the Land. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of host-based attack types including privilege escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering
    Use mimikatz to perform a pass-the-hash attack
    Demonstrate how to attack kerberos using rubeus
    Use certipy to attack active directory certificate services
    Demonstrate how to use seatbelt to perform security oriented host-survey safety checks
  • Use psexec to detect privilege escalation
    Demonstrate how to perform attacks using powershell
    Use evil-winrm to perform host-based attacks
    Perform living off the land binaries (lolbins) host-based attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 19s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 25s
    Upon completion of this video, you will be able to provide an overview of host-based attack types including privilege escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering. FREE ACCESS
  • Locked
    3.  Performing Pass-The-Hash Attacks Using Mimikatz
    9m 18s
    In this video, find out how to use Mimikatz to perform a pass-the-hash attack. FREE ACCESS
  • Locked
    4.  Attacking Kerberos Using Rubeus
    6m 59s
    In this video, we will demonstrate how to attack Kerberos using Rubeus. FREE ACCESS
  • Locked
    5.  Attacking Active Directory Certificate Services Using Certipy
    17m 39s
    Learn how to use Certipy to attack Active Directory Certificate Services. FREE ACCESS
  • Locked
    6.  Performing Safety Checks Using Seatbelt
    12m 32s
    In this video, we will demonstrate how to use Seatbelt to perform security oriented host-survey safety checks. FREE ACCESS
  • Locked
    7.  Detecting Privilege Escalation Using PSEXEC
    10m 23s
    In this video, you will learn how to use PSEXEC to detect privilege escalation. FREE ACCESS
  • Locked
    8.  Performing PowerShell Attacks
    14m 54s
    In this video, we will demonstrate how to perform attacks using PowerShell. FREE ACCESS
  • Locked
    9.  Performing Host-Based Attacks Using Evil-WinRM
    9m 43s
    During this video, discover how to use Evil-WinRM to perform host-based attacks. FREE ACCESS
  • Locked
    10.  Performing Living Off the Land Attacks
    9m 1s
    In this video, discover how to perform Living Off the Land binaries (LOLbins) host-based attacks. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 11 users Rating 4.4 of 11 users (11)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)