Exploiting Host-based Vulnerabilities for CompTIA PenTest+

Many exploits are aimed at server and workstation operating systems. Once you have compromised the network, you will want to zero in on specific hosts and their applications. Understanding how hosts are configured and what they might include within themselves will help any security professional. This course will prepare you to exploits hosts in any engagement.
Course info
Rating
(17)
Level
Intermediate
Updated
Mar 20, 2020
Duration
2h 20m
Table of contents
Description
Course info
Rating
(17)
Level
Intermediate
Updated
Mar 20, 2020
Duration
2h 20m
Description

Network services aren't the only source of vulnerability for an organization. In this course, Exploiting Hosts-based Vulnerabilities for CompTIA PenTest+, you will gain the ability to engage and exploit different host targets during an engagement. First, you will learn the commonalities that all Windows hosts have with each other as well as a different distrobution of Linux hold in common. Once you understand this, you'll be able to utilize this knowledge to your advantage. Next, you will discover that similar OS also offers up services, protocols and even some built-in account that make them extremely attractive to attack. Finally, you will explore how default configurations and setting can haunt an organization when it comes to attackers gaining access to resources that are in some cases mission critical. When you are finished with this course, you will have the skills and knowledge of penetration tester needed to exploit hosts on any engagement.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Dale Meredith, and I want to welcome you to my course, Exploiting Host‑based Vulnerabilities for CompTIA PenTest+. Now, this course is part seven in the series for CompTIA PenTest+ certification program, but guess what, this isn't going to be just one of those courses to teach you about the certification, we'll also cover other information that's more real world and based on some of my experiences. I know, you're thinking, Dale, that's a great deal. In this course, we'll dive into how we can exploit several different vectors that are present in host operating systems. You'll first learn the commonalities that all Windows hosts have in common that create some of the vulnerabilities we experience. Next, we'll do the same for .Nix hosts. I know you're thinking .Nix, that's N, I, X, it's short for UNIX and Linux, and all of its different distros, including Android, Mac OS, and iOS. Yep, these operating systems have issues too. Then you'll discover that all these different operating systems also offer up services, protocols, and some built‑in accounts that makes them extremely attractive to attacks. Finally, you'll learn about alternate data streams, man that's some scary stuff, privilege escalation, and other things that'll make you go hmm. When you're finished with this course, you'll have the skills and knowledge of a penetration tester that's needed to exploit hosts on any engagement. As far as the pre‑reqs are concerned for this course, please don't start the course without watching the first six courses in this series, especially the first course, laying a foundation for penetration testing for CompTIA PenTest+. This is where you will learn to set up the lab environment that you'll see me use in the demos, and I want you to be able to follow along. Now, as far as your background is concerned, to understand the content here, you should have a knowledge of networking, the devices used, how to navigate around these different operating systems, and maybe even some security background. Now after you watch this course, you should feel really comfortable in diving further into the series. I would even go back and look at some of our ethical hacking courses as well. Now that author is good looking. I hope you join me in learning and understanding the concepts of Exploiting Host‑based Vulnerabilities for CompTIA PenTest+ here, at Pluralsight.