From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Network-based exploits
From the course: CompTIA PenTest (PT0-002) Cert Prep
Network-based exploits
- There are many more types of exploits for which you'll be responsible for the PenTest exam. You don't need to know all the technical details of each of these exploits. You just need to know a little bit about what each exploit type would be so that when you start doing research on determining which exploits map to vulnerabilities that you've already found, you can choose the right attacks and exploits to use for your test. So let's take a look at network-based exploits. This is a collection of exploits, once again, you just want to be aware of what each one kind of is. The first category is name resolution exploits. Those include NetBIOS name service, or NBNS, which is part of NetBIOS-over-TCP. So it's basically a Microsoft network type of name resolution service. In fact, it's similar functionality to DNS. It translates a host name to an IP address. That's where you've got the whole host name idea over NetBIOS working in a TCP environment. So you get that translation. There's…
Contents
-
-
-
-
-
Exploit resources and network attacks4m 37s
-
(Locked)
Network-based exploits7m 7s
-
(Locked)
FTP exploit demo8m 14s
-
(Locked)
Man-in-the-middle exploits7m 6s
-
(Locked)
Labtainers lab: TCP/IP attacks2m 9s
-
(Locked)
Labtainers lab: ARP spoof attack1m 53s
-
(Locked)
Labtainers lab: Local DNS attacks1m 47s
-
(Locked)
Labtainers lab: MACs and hash functions1m 19s
-
-
-
-
-
-
-
-
-
-