You have identified the big computing assets that an enterprise wants to keep protected — networks, hosts, and applications — and have done what you can to exploit their vulnerability. This is the core phase of any penetration testing engagement, but you are not done. You need to engage in post-exploitation activities to escape security countermeasures and maintain a foothold in the organization, long though the main actions have been accomplished.
In this course, Post Exploit Tasks for CompTIA PenTest+, you will gain understanding of the steps and techniques that you can use during this phase and the engagement. First, you will learn different lateral movement techniques that allow you make the most impact of the exploits you have already discovered. Once you understand this, you will learn about pivoting through port forwarding, VPNs, SSH, and others. Next, you will explore the different ways you can maintain persistence within the target network without drawing much attention to your self. Finally, you will use specific anti-forensics techniques to avoid software that is designed to catch you and your activities
When you are finished with this course, you will have the skills and knowledge of penetration tester needed to complete your post-exploit tasks on any any engagement.
Software required: [software required.] *
Setting up the Lab environment from the "Laying the Foundation for Penetration Testing for CompTIA PenTest+" course.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview Hey everyone. My name is Dale Meredith, and I want to welcome you to my course, Post Exploit Tasks for CompTIA PenTest+. Now listen, this is course number nine in a series for the CompTIA PenTest+ certification program. But guess what? I'm not going to just give you a course about what you need to know about certification, I'm also going to cover other information that's more real world and based off some of my experiences. In this course, you'll learn what steps and techniques that you can use during this phase of an engagement. First, you'll learn different lateral movement techniques that allow you to make the most impact of the exploits that you've already discovered. Once you understand this, you'll learn about pivoting through port 40, VPNs, SSH, and oh so many more. Next, you'll learn about the different ways that you can maintain persistence within a target network without drawing a lot of attention to yourself. And finally, you'll use specific defensive evasion techniques to avoid software that's designed to catch you in your activities. Now when you're finished with this course, you will have the skills and knowledge that a penetration tester needs to complete post‑exploit tasks on any engagement. And as far as the prerequisites are concerned, please, please don't start this course without first watching the original eight courses in this series. Most importantly, the first course. It was called Laying a Foundation for Penetration Testing for CompTIA PenTest+. That's the course where I go through and show you how to set up a lab environment that you're going to see me use in my demos here, and I want you to be able to follow along with me. Now, after you finish watching this course, you should feel really comfortable in diving further into this series. I would even go back and watch some of our Ethical Hacking courses as well. Now that guy knows what he's talking about. Listen, I hope you'll join me in learning and understanding the concepts of post‑exploit tasks for CompTIA PenTest+, here at Pluralsight.