From the course: CompTIA PenTest+ (PT0-003) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Additional local host vulnerabilities

Additional local host vulnerabilities

From the course: CompTIA PenTest+ (PT0-003) Cert Prep

Additional local host vulnerabilities

- We're focusing on a few more host-based attacks where the goal is to escalate privileges, move laterally, or gather information from within a compromised host. The PT0-003 exam introduces several powerful tools used by attackers and red teamers in Windows environments. These include Rubios, Certify, Seat Belt, PS Exec, and Evil WIN RM, each of which supports a different phase of post exploitation. Let's take a look at how each tool works and what it helps us accomplish during a host-based penetration test. Rubios is a powerful post exploitation tool focused on Kerberos abuse within active directory environments. It can request, extract, and inject tickets, perform Kerberoasting, or carry out golden and silver ticket attacks. Rubios is particularly valuable for lateral movement and privileged escalation by targeting misconfigured Kerberos implementations. It's a must know tool for any red teamer working in AD…

Contents