From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Additional local host vulnerabilities
From the course: CompTIA PenTest+ (PT0-003) Cert Prep
Additional local host vulnerabilities
- We're focusing on a few more host-based attacks where the goal is to escalate privileges, move laterally, or gather information from within a compromised host. The PT0-003 exam introduces several powerful tools used by attackers and red teamers in Windows environments. These include Rubios, Certify, Seat Belt, PS Exec, and Evil WIN RM, each of which supports a different phase of post exploitation. Let's take a look at how each tool works and what it helps us accomplish during a host-based penetration test. Rubios is a powerful post exploitation tool focused on Kerberos abuse within active directory environments. It can request, extract, and inject tickets, perform Kerberoasting, or carry out golden and silver ticket attacks. Rubios is particularly valuable for lateral movement and privileged escalation by targeting misconfigured Kerberos implementations. It's a must know tool for any red teamer working in AD…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Application exploits, part 15m 23s
-
SQL injection demo8m 32s
-
(Locked)
Labtainers lab (SQL injection)2m 39s
-
(Locked)
Application exploits, part 27m 57s
-
(Locked)
Application exploits, part 38m 56s
-
(Locked)
Cross-site scripting demo6m 54s
-
(Locked)
Labtainers lab (cross-site scripting)1m 42s
-
(Locked)
Labtainers lab (cross-site request forgery)1m 20s
-
(Locked)
API attacks and attack resources6m 18s
-
(Locked)
Privilege escalation (Linux)9m 31s
-
(Locked)
Privilege escalation (Windows)6m 1s
-
(Locked)
Privilege escalation: Miscellaneous7m 49s
-
(Locked)
Local host vulnerabilities: Miscellaneous8m
-
(Locked)
Additional local host vulnerabilities2m 54s
-
(Locked)
-
-
-
-
-
-
-