From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Prioritization of vulnerabilities
From the course: CompTIA PenTest (PT0-002) Cert Prep
Prioritization of vulnerabilities
- So we've moved one more step forward in the penetration testing process. So you can see, it's like a bunch of building blocks. We first looked at which assets were most important. We ranked them. Then based on those assets and that asset ranking, we ranked the vulnerabilities on those assets. So it's almost like a 2D matrix at that point. So now we know which vulnerabilities are the most important. Now let's take a look at what exploits we can use to leverage those vulnerabilities. So that's why it's important to do an asset ranking followed by a vulnerability based on asset ranking, followed by exploit based on vulnerability ranking. So it's almost like we have a three-dimensional matrix going on here, but it's important to build this database so that we can take the most important exploits that are going to be the biggest bang for the buck. So we're leveraging this information to prepare for exploitation selection, so we can map the vulnerabilities to potential exploits and then…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-