From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Application and open-source resources
From the course: CompTIA PenTest (PT0-002) Cert Prep
Application and open-source resources
- Penetration testing is a lot like peeling an onion. You go layer by layer and you get closer and closer in, and sometimes you end up crying. But it's a fun process in the process. And what we're going to be doing now is kind of just peeling one more layer of that onion. We've started off planning, we've now gotten a little bit of an idea of what's out there, the different targets we may want to start attacking or at least working toward the attacks. And now, we need to learn more about these targets and try to figure out how we can find some of their soft spots, look for the vulnerabilities. So let's peel away one more layer of the onion, and let's take a look at one particular type of attack or rather type of target. What if the target is an application? What are the things we can do to help target an application and find its soft spots? Well, first off, we can attempt to take an executable and turn it back into source code. That's called decompilation. So let's back up for a…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-