From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Additional enumeration techniques
From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Additional enumeration techniques
- Now we're covering a few more important updates to the PT0-003 exam, specifically, in the areas of web crawling and pen testing tools. First, we'll explore how files like robots.text, and Sitemaps can assist attackers during reconnaissance, along with the risks of using certain web platform plugins. Then we'll introduce two powerful tools that you need to know about In Packet, which enables protocol level attacks and MSV Venom, a payload generation tool used in the Metasploit framework. The robots.text file tells web crawlers, which pages or directories they should avoid indexing. While intended for search engines, attackers often check this file for hidden directories, admin panels, or staging environments that may have been excluded from public view, but are still accessible. Always check robots.text during reconnaissance, it's often a map to pages the organization doesn't want you to see. Like robots.text,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Scanning and enumeration3m 55s
-
(Locked)
Scanning demo10m 42s
-
(Locked)
Packet investigation7m 44s
-
(Locked)
Packet inspection demo5m 45s
-
(Locked)
Labtainers setup12m 5s
-
(Locked)
Labtainers lab (Wireshark)8m 52s
-
(Locked)
Application and open-source resources10m 59s
-
(Locked)
Prioritize and prepare attacks3m 48s
-
(Locked)
Passive reconnaissance9m 55s
-
(Locked)
Active reconnaissance7m 40s
-
(Locked)
Additional enumeration techniques2m 49s
-
(Locked)
Vulnerability scanning8m 31s
-
(Locked)
Vulnerability scanning demo16m 15s
-
(Locked)
Labtainers lab (network basics)2m 55s
-
(Locked)
Labtainers lab (Nmap discovery)3m 14s
-
Target considerations15m 22s
-
(Locked)
Analyzing scan output6m 13s
-
(Locked)
Nmap scoping and output options20m 55s
-
(Locked)
Nmap timing and performance options6m 25s
-
(Locked)
Prioritization of vulnerabilities8m 54s
-
(Locked)
Common attack techniques11m 58s
-
(Locked)
Automating vulnerability scans3m 31s
-
(Locked)
Credential attacks14m 19s
-
(Locked)
Labtainers lab (password cracking)2m 28s
-
(Locked)
Labtainers lab (secure socket layers)2m 34s
-
(Locked)
Labtainers lab (routing basics)2m 5s
-
(Locked)
-
-
-
-
-
-
-
-
-
-