From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Scanning and demo
From the course: CompTIA PenTest (PT0-002) Cert Prep
Scanning and demo
- So if you've looked ahead, you'll see that we don't actually get to the tools until a later objective. Right now we're still doing information gathering, but in order to do that we actually have to use tools. So starting now, we're going to start looking at some of the tools that you'll need to be aware of, even though we don't technically cover the tools until later, we're going to start using them. It's extremely important to succeed on this exam that you have hands-on experience with these tools. That's why we went ahead and had you set up the lab so that you can run these tools just like we are running them here. So let's go into our lab. Let's launch virtual machine and the, actually VirtualBox and the virtual machines and let's run our first scan. So if I go into Metasploitable and type in, and of course I log in as msfadmin, so I just type in as msfadmin, which is Metasploitable framework admin with the same password, msfadmin. Alright, so now we're logged in and if I use…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-