Category Archives: Uncategorized

CompTIA Pentest+ PT0-002 – Section 18: Communication and Reports Part 1
March 13, 2023

171. Communication and Reports (OBJ 4.3) In this section of the course, we’re going to discuss the importance of communication during the penetration testing process, and the different components that you should include in your final written report that you’re going to deliver to your client. As we move through this section, we’re going to […]

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 4
March 12, 2023

169. Persistence and Covering Your Tracks (OBJ 3.7) In this demonstration, I’m going to show you how you can set up scheduled tasks for persistence, as well as to cover your tracks in a basic windows environment. Now, for this particular demonstration, I am using a very old version of Windows, which is actually Windows […]

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 3
March 12, 2023

166. Convert Channels (OBJ 3.7) Covert Channels. Now, in the last lesson on data exfiltration, I talked about overt channels. Things like FTP, or peer-to-peer, or instant messaging, that are obvious ways to send data. But data exfiltration can also happen over covert channels. We talked about this by hiding data inside of DNS and […]

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 2
March 11, 2023

164. Living off the Land (OBJ 3.7) In this lesson, we’re going to talk about living off the land and some differences between some traditional malware exploitation techniques. And so we have to first define what is an exploit technique? Well, an exploit technique describes the specific method by which malware code infects a targeted […]

CompTIA Pentest+ PT0-002 – Section 17: Detection Avoidance Part 1
March 11, 2023

161. Detection Avoidance (OBJ 3.7) In this section of the course, we’re going to discuss the different techniques that are used during the post exploitation portion of your attacks against a target in order to establish a foothold, maintain persistence and avoid detection. Now, we’re going to be completing our coverage of Domain 3, attacks […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 3
March 10, 2023

157. Lateral Movement (OBJ 3.7) Now, we talked about lateral movement already and I already provided a couple of examples or techniques that we can use for lateral movement as an attacker if you’re working as a pen tester. Things like pass the hash or golden ticket attack. But there are other ones out there […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 4
March 10, 2023

159. Escalating Privileges (OBJ 3.7) In this lesson, we’re going to talk about escalating privileges, which is something an attacker tries to do once they exploit a target system or network. This is known as privilege escalation. Simply put, privilege escalation is the practice of exploiting flaws in an operating system or other application to […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 2
March 9, 2023

154. Lateral Movement and Pivoting (OBJ 3.7) Lateral movement and pivoting. If you’ve ever watched American football, you’ve probably seen a lateral pass. Now, a lateral pass occurs when the player tosses the ball to a teammate by throwing it to the side or behind them, and that way you’re moving the ball to another […]

CompTIA Pentest+ PT0-002 – Section 16: Post-exploitation Part 1
March 9, 2023

151. Post-exploitation (OBJ 3.7) In this section of the course, we’re going to discuss different techniques that are used during the post exploitation part of your attacks against a target network. Now post exploitation actions are any actions that you take after the initial attack or exploit has been successful. For example, if you were […]

CompTIA Pentest+ PT0-002 – Section 15: Attacks on Specialized Systems Part 4
March 8, 2023

149. Virtual Machine Attacks (OBJ 3.5) In this lesson, we’re going to discuss virtual machine attacks, including VM escapes, VM hopping, sandbox escapes and other VM concerns. First, we have VM escapes or virtual machine escapes. A VM escape is a type of attack where a threat actor attempts to get out of an isolated […]

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!