Tools and Code Analysis for CompTIA Pentest+
This course will teach you how to use the various pentest tools and code analysis techniques needed for the PT0-002 exam.
What you'll learn
In this course, Tools and Code Analysis for CompTIA Pentest+, you’ll learn how to use the various pentest tools and code analysis techniques to pass the exam. First, you’ll explore Scripting and Shellcoding. In that module you will explore the various shells, and how to write scripts with different scripting languages. Next, you’ll discover how to use the tools for reconnaissance leading up to discovery of exploitable or vulnerable targets. Here you will explore a lot of tools and their capabilities in various phases of a pentest. Finally, you’ll learn how to how to leverage the tools for vulnerability analysis, exfiltration, and ultimately persistence. This module is also tool intensive highlighting the capabilities in various phases of a pentest. When you’re finished with this course, you’ll have the skills and knowledge of Tools and Code Analysis for CompTIA Pentest+ needed for the PT0-002
Table of contents
- What to Expect in This Module 1m
- Domain Lookups with WHOIS 2m
- OSINT with DNS 4m
- OSINT with Maltego 4m
- OSINT with Shodan 5m
- Information Gathering with theHarvester 2m
- Scanning with Wapiti 2m
- Scanning Git Repo's Using Trufflehog 2m
- File Reconnaissance with Metagoofil 2m
- Social Engineering with SET 3m
- Social Engineering with BeEF 5m
- Credential Access with Responder 3m
- Module Summary 0m
- What to Expect in This Module 1m
- Vulnerability Scanning with Nessus 7m
- Finding Web Vulnerabilities with Nikto 3m
- Finding WordPress Vulnerabilities Using WPScan 3m
- Finding SQL Vulnerabilities Using SQLMap 3m
- Searching for Vulnerabilities Using Searchsploit 2m
- Steganography Using StegSnow 2m
- Steganography Using StegHide 3m
- Generating Word Lists Using CeWL 3m
- Credential Bruteforcing with Patator 3m
- Credential Testing with Medusa 2m
- Credential Testing with Hydra 2m
- Credential Testing with John the Ripper 3m
- URI Bruteforcing with Gobuster 3m
- Packet Capturing with Wireshark 2m
- Wifi Attacks with Aircrack-ng 4m
- Wifi Attacks with Wifite 2m
- Post Exploitation with Metasploit 3m
- Website Attacks with BurpSuite 6m
- Module Summary 0m