From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,500 courses taught by industry experts.
Target considerations
From the course: CompTIA PenTest (PT0-002) Cert Prep
Target considerations
- When we start running all of these different vulnerability scans, it's important to consider the various targets. And remember that it's extremely rare that any two targets will be identical. Now, there are the cases where you'll have cloned targets. Sometimes they're synchronized so that they are pretty much the same. But even in that case, the function is likely that one is going to be the primary and another is a secondary. So even if they are cloned, there might be subtle differences. In most cases, however, you'll find that targets are not going to at all be the same. So you've got to consider the different aspects of the different targets. So let's take a look at a few different aspects. First off, we are using virtual machines. That is a practice that is becoming more and more popular both in on-premises data centers as well as cloud-based service providers. So in many cases, you're going to encounter targets that are not physical machines like we used to have in the legacy…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-