Chapter 6Exploit and Pivot

THE PENTEST+ EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.4 Explain the process of leveraging information to prepare for exploitation
    • Map vulnerabilities to potential exploits
    • Prioritize activities in preparation for penetration test
    • Describe common techniques to complete attack
      • Cross compiling code
      • Exploit modification
      • Exploit chaining
      • Proof-of-concept development (exploit development)
      • Social engineering
      • Credential brute-forcing
      • Dictionary attacks
      • Rainbow tables
      • Deception

Domain 3: Attacks and Exploits

  •  3.7 Given a scenario, perform post-exploitation ...

Get CompTIA PenTest+ Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.