Monthly Archives: March 2023

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 2
March 11, 2023

164. Living off the Land (OBJ 3.7) In this lesson, we’re going to talk about living off the land and some differences between some traditional malware exploitation techniques. And so we have to first define what is an exploit technique? Well, an exploit technique describes the specific method by which malware code infects a targeted […]

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 1
March 11, 2023

161. Detection Avoidance (OBJ 3.7) In this section of the course, we’re going to discuss the different techniques that are used during the post exploitation portion of your attacks against a target in order to establish a foothold, maintain persistence and avoid detection. Now, we’re going to be completing our coverage of Domain 3, attacks […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 3
March 10, 2023

157. Lateral Movement (OBJ 3.7) Now, we talked about lateral movement already and I already provided a couple of examples or techniques that we can use for lateral movement as an attacker if you’re working as a pen tester. Things like pass the hash or golden ticket attack. But there are other ones out there […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 4
March 10, 2023

159. Escalating Privileges (OBJ 3.7) In this lesson, we’re going to talk about escalating privileges, which is something an attacker tries to do once they exploit a target system or network. This is known as privilege escalation. Simply put, privilege escalation is the practice of exploiting flaws in an operating system or other application to […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 2
March 9, 2023

154. Lateral Movement and Pivoting (OBJ 3.7) Lateral movement and pivoting. If you’ve ever watched American football, you’ve probably seen a lateral pass. Now, a lateral pass occurs when the player tosses the ball to a teammate by throwing it to the side or behind them, and that way you’re moving the ball to another […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 1
March 9, 2023

151. Post-exploitation (OBJ 3.7) In this section of the course, we’re going to discuss different techniques that are used during the post exploitation part of your attacks against a target network. Now post exploitation actions are any actions that you take after the initial attack or exploit has been successful. For example, if you were […]

CompTIA Pentest+ PT0-002 – Section 15: Attacks on Specialized Systems Part 4
March 8, 2023

149. Virtual Machine Attacks (OBJ 3.5) In this lesson, we’re going to discuss virtual machine attacks, including VM escapes, VM hopping, sandbox escapes and other VM concerns. First, we have VM escapes or virtual machine escapes. A VM escape is a type of attack where a threat actor attempts to get out of an isolated […]

CompTIA Pentest+ PT0-002 – Section 15: Attacks on Specialized Systems Part 3
March 8, 2023

146. ICS Protocols and Vulnerabilities (OBJ 3.5) In this lesson, we’re going to talk about the different industrial control system protocols that you may come across in your position as a cyber security practitioner. These protocols include the controller area networks, or CAN, the Modbus, the data distribution service, or DDS, and the safety instrumented […]

CompTIA Pentest+ PT0-002 – Section 15: Attacks on Specialized Systems Part 1
March 7, 2023

141. Attacks on Specialized Systems (OBJ 3.5) In this section of the course, we’re going to discuss the different types of attacks that can be conducted against specialized systems. Such as the internet of things devices, embedded systems, ICS and SCADA devices, data storage systems, virtual machines, hypervisors, and containerized services. The internet of things […]

CompTIA Pentest+ PT0-002 – Section 15: Attacks on Specialized Systems Part 2
March 7, 2023

144. Embedded Systems (OBJ 3.5) In this lesson, we’re going to start talking about some embedded system vulnerabilities. Because we talked about the fact that a lot of these devices that we connect to the internet as part of the internet of things at large, do have embedded operating systems, like Linux or Android or […]

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!